Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 00:56

General

  • Target

    file.exe

  • Size

    2.8MB

  • MD5

    9dc0a5ebbf0646a38b1bb1b955db0fa0

  • SHA1

    49d4045a7429e901ca1e549d07aa1e92947d6648

  • SHA256

    3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401

  • SHA512

    c4aac730ece0c6e55187590727242afad77765c777ea36447ba54cd47c92b49e2c54311f4115f21caff963a3f3a705958e94d96df3a79f3ebf2059f2b80a64a2

  • SSDEEP

    49152:47+vMFnbzAfQORD1U3Ny3Gpdjn1/oWq33pN+OTDZcKkcmO6:4KubcfQORD1U303GpdbZoWq35N+sZXk+

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://shineugler.biz/api

https://tacitglibbr.biz/api

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://shineugler.biz/api

https://immureprech.biz/api

https://deafeninggeh.biz/api

https://tacitglibbr.biz/api

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 12 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Users\Admin\AppData\Local\Temp\1015327001\H9TU4oY.exe
        "C:\Users\Admin\AppData\Local\Temp\1015327001\H9TU4oY.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4868
      • C:\Users\Admin\AppData\Local\Temp\1015387001\21ba800b15.exe
        "C:\Users\Admin\AppData\Local\Temp\1015387001\21ba800b15.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:408
      • C:\Users\Admin\AppData\Local\Temp\1015388001\1091586dbe.exe
        "C:\Users\Admin\AppData\Local\Temp\1015388001\1091586dbe.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:5116
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4284
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4680
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1740
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4872
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3436
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4512
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4880
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2004
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:2388
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3700
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:5104
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:1008
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:5092
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5108
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1848
        • C:\Users\Admin\AppData\Local\Temp\1015389001\83307bfebd.exe
          "C:\Users\Admin\AppData\Local\Temp\1015389001\83307bfebd.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4568
        • C:\Users\Admin\AppData\Local\Temp\1015390001\9de294276b.exe
          "C:\Users\Admin\AppData\Local\Temp\1015390001\9de294276b.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1104
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
            4⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2068
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc2e1ecc40,0x7ffc2e1ecc4c,0x7ffc2e1ecc58
              5⤵
                PID:3228
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:2
                5⤵
                  PID:4228
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:3
                  5⤵
                    PID:1404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:8
                    5⤵
                      PID:5060
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:4676
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2388
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4524,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4568 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1724
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4808 /prefetch:8
                      5⤵
                        PID:636
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4848,i,13206105553954269691,4480513420699373711,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:8
                        5⤵
                          PID:2020
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                        4⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        PID:5236
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2b9246f8,0x7ffc2b924708,0x7ffc2b924718
                          5⤵
                          • Checks processor information in registry
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5252
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
                          5⤵
                            PID:5576
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
                            5⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5584
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8
                            5⤵
                              PID:5688
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:5900
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:5960
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:5856
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:5864
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                              5⤵
                                PID:6112
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
                                5⤵
                                  PID:5824
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2616 /prefetch:2
                                  5⤵
                                    PID:5576
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2348 /prefetch:2
                                    5⤵
                                      PID:3904
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2328 /prefetch:2
                                      5⤵
                                        PID:4688
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16577553806480872578,16743098681858422081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2456 /prefetch:2
                                        5⤵
                                          PID:552
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\HIJEGDBGDB.exe"
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3780
                                        • C:\Users\Admin\Documents\HIJEGDBGDB.exe
                                          "C:\Users\Admin\Documents\HIJEGDBGDB.exe"
                                          5⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          PID:5424
                                    • C:\Users\Admin\AppData\Local\Temp\1015391001\d0ffe72766.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1015391001\d0ffe72766.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:4944
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1816
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM chrome.exe /T
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1780
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM msedge.exe /T
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3784
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM opera.exe /T
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1088
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM brave.exe /T
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3440
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                        4⤵
                                          PID:4776
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                            5⤵
                                            • Checks processor information in registry
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1492
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1255d7ac-2900-46d5-8790-de64febb363a} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" gpu
                                              6⤵
                                                PID:1316
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9215dda-3d19-4b34-9776-ffdec296fa59} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" socket
                                                6⤵
                                                  PID:4804
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3152 -childID 1 -isForBrowser -prefsHandle 3160 -prefMapHandle 2908 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39c449b0-8539-4886-9c01-73adf1fe6a98} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" tab
                                                  6⤵
                                                    PID:3644
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3020 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5af308ad-698b-4417-a7f6-ee5c61b42e3d} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" tab
                                                    6⤵
                                                      PID:4284
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4768 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4820 -prefMapHandle 4816 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1024a2ba-f19c-4e62-a9e3-21c0ae51489b} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" utility
                                                      6⤵
                                                      • Checks processor information in registry
                                                      PID:5328
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5364 -prefMapHandle 5412 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {849a19fb-f4f4-477b-bc10-120556496d67} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" tab
                                                      6⤵
                                                        PID:5904
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 4 -isForBrowser -prefsHandle 5584 -prefMapHandle 5592 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7eea5bf-ac4f-4d29-9592-820a73c32915} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" tab
                                                        6⤵
                                                          PID:5916
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5772 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6ce89cd-e9fa-4f0c-be39-54cced1d3009} 1492 "\\.\pipe\gecko-crash-server-pipe.1492" tab
                                                          6⤵
                                                            PID:5928
                                                    • C:\Users\Admin\AppData\Local\Temp\1015392001\1282fd559c.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1015392001\1282fd559c.exe"
                                                      3⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6012
                                                    • C:\Users\Admin\AppData\Local\Temp\1015393001\76e5883821.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1015393001\76e5883821.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4220
                                                      • C:\Users\Admin\AppData\Local\Temp\1015393001\76e5883821.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1015393001\76e5883821.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5340
                                                    • C:\Users\Admin\AppData\Local\Temp\1015394001\1ec6e28352.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1015394001\1ec6e28352.exe"
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      PID:216
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015394001\1ec6e28352.exe" & rd /s /q "C:\ProgramData\LXTR9HLFK6F3" & exit
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:736
                                                        • C:\Windows\SysWOW64\timeout.exe
                                                          timeout /t 10
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Delays execution with timeout.exe
                                                          PID:6100
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 1976
                                                        4⤵
                                                        • Program crash
                                                        PID:5204
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:3432
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:3848
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 216 -ip 216
                                                      1⤵
                                                        PID:5640
                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:4700
                                                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:4208
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          2⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4588
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                          2⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4504
                                                          • C:\Windows\system32\PING.EXE
                                                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                            3⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:5828
                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:3668
                                                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:5716
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          2⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5836
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                          2⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4588
                                                          • C:\Windows\system32\PING.EXE
                                                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                            3⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:4812

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\ProgramData\CAFHDBGHJKFIDHJJJEBK

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        bc61b9afdc27047f927631ca2eaa03d2

                                                        SHA1

                                                        bd1b6ee1e5cf7cc7caf2eb0d1b05c590b27f00ae

                                                        SHA256

                                                        af8ddcbe953df2580c9cec2b2691c9d6658b083ba7b5b504d53ef311faa37c53

                                                        SHA512

                                                        0ac753bf2e09d3530d5cd75cc30ecf3ff3cfcf45e248976cfc39e0207b20f1d6f654da44c37ce16511f275951cfcd5007e58eb71298faa2edb70d176c429a6ee

                                                      • C:\ProgramData\mozglue.dll

                                                        Filesize

                                                        593KB

                                                        MD5

                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                        SHA1

                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                        SHA256

                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                        SHA512

                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                        Filesize

                                                        150B

                                                        MD5

                                                        4de876a5da9132d2f153e2fbd085a547

                                                        SHA1

                                                        34539109af459f64f4312e781a943abf453b9366

                                                        SHA256

                                                        69ea09859e3fba426ece1261660d5cec8a5090bb686d3fb68d92b55e31ad69eb

                                                        SHA512

                                                        622d3ccbc968341334de7696ee687008417965edae0dd3e3f28a8c7536f0092f6211c5cf0fe025fbe3801054b5ee8b89ab36d24e269d5b24df334462acd1a1ac

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                        Filesize

                                                        284B

                                                        MD5

                                                        03c8204d28242f245c9900f5d21e6ebb

                                                        SHA1

                                                        8a00eebda4cd569b66a59708f6e82f7048f189a4

                                                        SHA256

                                                        67f2154dbbaf3664d1d977a09c6f33ab54b5978e4342270f244e06ba36750a4f

                                                        SHA512

                                                        b86bd2b3c922d24610a36ec2b26ebac5cc43378ba0f88c96b73edb4de1d520b481838f847a66c7dae39cc39f18974eaf9b6e35edacd7af9cd84850d9f3b301f4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                        Filesize

                                                        418B

                                                        MD5

                                                        143d657c1b74cf76793b2f53daf5a994

                                                        SHA1

                                                        fd0b9ebc6385639df59a6dd38118dec5755051ed

                                                        SHA256

                                                        d353aa647dbdf5b0e9d0a51e5366f8ac950ca2106789aedf8c292c242049671d

                                                        SHA512

                                                        d47036fa696feeefbdd67fa9f5caab4c7214f70bc02de3da7893a7aedeb2f594d28d5dd38d1abce45576ab0f83f80ef5baf706516787744cdf4ea3c6aa22e22f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0d438f00-a90f-4f6e-8be0-9e9b3539fbd2.dmp

                                                        Filesize

                                                        838KB

                                                        MD5

                                                        8c67fab8d704e883e253e21ef9aa6cae

                                                        SHA1

                                                        0ce49c8f9356e11b9a5d968cd109642b5f3072d1

                                                        SHA256

                                                        705db86f8339d0c5ed495c3c218442e1972deef3a48e5363a529e1f417a81281

                                                        SHA512

                                                        8fec2d6b6b780368e373bb4ad73b4883904f3817689a70a813d9e24f42cc4af92fecfcba6e6fa465c065a7cdd05ccf1036a4d2beb295ecc7e71b232ea4bbff31

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\772c2985-4248-4298-9298-c1b529b43d92.dmp

                                                        Filesize

                                                        826KB

                                                        MD5

                                                        c001ca41709996c42c20e177f5784f96

                                                        SHA1

                                                        ddcbfcc79597e74603c6217ed5ed084a0d423882

                                                        SHA256

                                                        5d7d35b2a953a4af02c1581980c85e9eae6963099ad5d881a34dbd8efc272e39

                                                        SHA512

                                                        5ff8ba5e8b23f3cbcad7ec84cee303478ad635b8a7af46be6a1f391cfaaca015b4538db368a1a0ce36a4b18a402686a2daa390cb3760fb31a791a235a7aed1f3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7c51971a-0e96-4f53-b03f-a0b2ab15f954.dmp

                                                        Filesize

                                                        826KB

                                                        MD5

                                                        137fb4c1623ded21cfd77165dd402e98

                                                        SHA1

                                                        aa4eac1e9269c96c51d81bc71d756f07872fc736

                                                        SHA256

                                                        98d13d39209b93a759d78466ba5e4551e03a6cc3358530ff10c606cd46af75bf

                                                        SHA512

                                                        5339caa30bf974530d1c882e8425b49cd2559a1d25670f52087c987e711857086fe9c898e264216ec0f8ccaf6c7af19b6e3b3a277d5c785ebb6b1baa4819b675

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9be74766-7385-455d-8bd0-1c9167ffcfc4.dmp

                                                        Filesize

                                                        838KB

                                                        MD5

                                                        b1a45b31cca17ebf140e3e297ff47576

                                                        SHA1

                                                        21936ff35cee72a38cf1c82b9c07161209804567

                                                        SHA256

                                                        6c4523261f0c2c9ffa6ce21a7d0d68c07e0244ea71409f3aca389cfd98f71b50

                                                        SHA512

                                                        392ba0efd681ff2bdac41d20182a8d303cc041e491ae4b846b4f2b2cacc2a499077ae1a98c21886193f7e4ab0e2d89981e3e9aea99a42c8974ee15c62e5a5e8b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d92e8166-a67c-4e05-b5b1-af95480fb925.dmp

                                                        Filesize

                                                        826KB

                                                        MD5

                                                        a02293d48690d73f8b694c65822fe795

                                                        SHA1

                                                        28dd2ba9bc8401b478681829844083ecf0d2f9da

                                                        SHA256

                                                        dd67984a6b12bbd86b2c6b57ba4602ca720f60676f949ead2a642440a829de6e

                                                        SHA512

                                                        730db14441b332d66a43808f97ad8e5b506ca79563a3f3320c5082b1f75905cb645a3b2c28fd8e483b98ac11fc93169b3f5fc704b71cba75b9da21cdebfe70d5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\dfe47e0b-be96-4306-8c85-2aadc0a01b4c.dmp

                                                        Filesize

                                                        838KB

                                                        MD5

                                                        0fd3038fa0e59110bce50a897a3069c6

                                                        SHA1

                                                        be0468ef9ca4486dbf0252b904177e6075eb2b90

                                                        SHA256

                                                        e22e51843473360e8546b45292a6fcc9016a9318739730937343bd1cd3bb6bd4

                                                        SHA512

                                                        c48522dda82a3ec28501fcbc6c4afa4ccd5890171b1f47bd7dee152e3ec3ba74f272ed2b22d2ecb0cc6fff16a45f5ea36d6f53702049ce7a561d6105601dca69

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        a0486d6f8406d852dd805b66ff467692

                                                        SHA1

                                                        77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                        SHA256

                                                        c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                        SHA512

                                                        065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        dc058ebc0f8181946a312f0be99ed79c

                                                        SHA1

                                                        0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                        SHA256

                                                        378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                        SHA512

                                                        36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        72465c48a8b0098c5634543ff5031879

                                                        SHA1

                                                        e4d4b1f750ed9361845f7eab0a763a43673e80ef

                                                        SHA256

                                                        c7348f91a309bc2a7a45604ce214b152b089252f5428da91978d9cb550a0600e

                                                        SHA512

                                                        e6295b0152a34eb8f38451b5e02fc869fd779b66908c3386590446a2320898ae3fdd490d2a8a8a135064544284ef326ee3131c6bd1cf51e53df0c2ab75c74583

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        39a9681e66fd7a24b4bbf02df1e6a0f2

                                                        SHA1

                                                        1762cecf293d84f5dd150950f31d9813e37ded7c

                                                        SHA256

                                                        e10c2e1e78770cf7f184655b67d0032ec6cfe98aa8e4936b34777225069da0c5

                                                        SHA512

                                                        c100b1ccb60a325ba87d2a3e537b55204b3bdb8e46038e66a5097ffa06730257f15a3ab240a0c056dacbaed9c42d004f703bd175a9fa60e64dbf4b1baf152738

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        b0b2a84cb6e43bdcd65a56a8fadba8b1

                                                        SHA1

                                                        be17ab6682d6b8d4725d67340b8ce7427cff3afd

                                                        SHA256

                                                        d353eea566ed176c363ae1cf0c486bf3d943d6fdc4408160caf2b2d334b082ec

                                                        SHA512

                                                        00cf970a32ea39357b83585f2df4d18e6efd76d37601a2244b2ec82784f1397cc18a1b026cd6051905eb47d066699a8b8da62d75162b2302258d7a9fb7d916d5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                        Filesize

                                                        264KB

                                                        MD5

                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                        SHA1

                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                        SHA256

                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                        SHA512

                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        813c8602fed2ac2d7b3317e71c9253c3

                                                        SHA1

                                                        64189ee0298bf1aee1cbf24b2ccdca18937d337e

                                                        SHA256

                                                        b27b833c0faa01d064f8b4ea50c9053b07ee59da60fd0a9c174dcf1e1a63f2c5

                                                        SHA512

                                                        feaf45c74fc7277411953c6c3f481d670f7e10a8da9cd55f528ddeca7f9605323b90064d561b2c86b6bd66e2342b150b6ecec7bffa57c472dd44fb2a340cae03

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        7ec7dce2d3612e4da4ef6bff49235668

                                                        SHA1

                                                        2c09ca30e030287922b7c2a3c8334074f2f32773

                                                        SHA256

                                                        98099cbd643c0e07e8e16e1b7f6a7de20ea80c3523847fbb41a6f5d2d85769da

                                                        SHA512

                                                        024e1a0ebe920126ca28db46fdff274fe450e2c9199fb7343e26d21fed6b159b91a99435dcdb553c74cce83d03547933f5a1e057e2acec1159d8158f0fd4bd9e

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                        SHA1

                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                        SHA256

                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                        SHA512

                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                      • C:\Users\Admin\AppData\Local\Temp\1015327001\H9TU4oY.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        6c1d0dabe1ec5e928f27b3223f25c26b

                                                        SHA1

                                                        e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                                                        SHA256

                                                        92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                                                        SHA512

                                                        3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                                                      • C:\Users\Admin\AppData\Local\Temp\1015388001\1091586dbe.exe

                                                        Filesize

                                                        4.2MB

                                                        MD5

                                                        3a425626cbd40345f5b8dddd6b2b9efa

                                                        SHA1

                                                        7b50e108e293e54c15dce816552356f424eea97a

                                                        SHA256

                                                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                        SHA512

                                                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                      • C:\Users\Admin\AppData\Local\Temp\1015389001\83307bfebd.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        940edd2fe38fed6be3308104058c852a

                                                        SHA1

                                                        04fdb57735acbc164de276ef08ecbff5051a7032

                                                        SHA256

                                                        72e93a91b256ea02b5fe97522f27e871f84005ff0a0fbbd5fdd415f861c361e5

                                                        SHA512

                                                        5bd88842fee9aef912c96e1f70727144b79be9bb7c77db7b7f4ad95b102e056958367fbdeff23a171b54291541c09ad05a13f1a658c6fe5c37cef024c8b835f8

                                                      • C:\Users\Admin\AppData\Local\Temp\1015390001\9de294276b.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        f89fb1ed90aba39bfca687d665d2fd35

                                                        SHA1

                                                        bcae179531aba2f0fb76c4fc8c85e85f53184a49

                                                        SHA256

                                                        74d71748f2970e4ce7b3538dba6054d6ed259a460e8ae2b72712a8922e096cd3

                                                        SHA512

                                                        2a2508e505d6dec9192a0161cfe022f39a12d01de410afda8d5849919cba07863e81195bcaf0dcd909c94c0304f84ec6a846e54af35568b25dce35dfba080428

                                                      • C:\Users\Admin\AppData\Local\Temp\1015391001\d0ffe72766.exe

                                                        Filesize

                                                        946KB

                                                        MD5

                                                        86d4e73a5e27be5d3c8ffd36aaa97f8f

                                                        SHA1

                                                        cbfd43b73b70cb9483e5d8ac3872dcb76a3f6d7e

                                                        SHA256

                                                        bf22063b217c09933dbd87865e33764ace09668a3589a524c8e032ea48097f7c

                                                        SHA512

                                                        f7f345605517e934e7826a3c78a3ed9cf39523f7d88871a14b214278768de80cf823c87c97f945711b1ee2a5eb2b8198494c974816011381ffb3a29e3f11005a

                                                      • C:\Users\Admin\AppData\Local\Temp\1015392001\1282fd559c.exe

                                                        Filesize

                                                        2.7MB

                                                        MD5

                                                        c31b1787ddc4948b88c53176d6dc77e6

                                                        SHA1

                                                        b57d3da39dfa1351a5a8805d5aae90d53d63fc96

                                                        SHA256

                                                        c4b54e565654d44bb0c5e656ec7da5d9b22fd3bcbd0a31466d478e0bd781d940

                                                        SHA512

                                                        5df05ee65bd6a9e2e3194f3f7fad5249b4c0895cc04790361745e9f8655820a066ec7c8f7963ff58c3648e9b0e489de1709c33914f0e446788d153201c88fcca

                                                      • C:\Users\Admin\AppData\Local\Temp\1015393001\76e5883821.exe

                                                        Filesize

                                                        710KB

                                                        MD5

                                                        28e568616a7b792cac1726deb77d9039

                                                        SHA1

                                                        39890a418fb391b823ed5084533e2e24dff021e1

                                                        SHA256

                                                        9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                                                        SHA512

                                                        85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                                                      • C:\Users\Admin\AppData\Local\Temp\1015394001\1ec6e28352.exe

                                                        Filesize

                                                        384KB

                                                        MD5

                                                        dfd5f78a711fa92337010ecc028470b4

                                                        SHA1

                                                        1a389091178f2be8ce486cd860de16263f8e902e

                                                        SHA256

                                                        da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                                                        SHA512

                                                        a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tet4vbya.4zp.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        9dc0a5ebbf0646a38b1bb1b955db0fa0

                                                        SHA1

                                                        49d4045a7429e901ca1e549d07aa1e92947d6648

                                                        SHA256

                                                        3e8ae41e05e6ea1741384f390d6e781a270035469ff2cf08678f55e0dae67401

                                                        SHA512

                                                        c4aac730ece0c6e55187590727242afad77765c777ea36447ba54cd47c92b49e2c54311f4115f21caff963a3f3a705958e94d96df3a79f3ebf2059f2b80a64a2

                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                        Filesize

                                                        1.6MB

                                                        MD5

                                                        72491c7b87a7c2dd350b727444f13bb4

                                                        SHA1

                                                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                        SHA256

                                                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                        SHA512

                                                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                        Filesize

                                                        458KB

                                                        MD5

                                                        619f7135621b50fd1900ff24aade1524

                                                        SHA1

                                                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                        SHA256

                                                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                        SHA512

                                                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                                        Filesize

                                                        2.2MB

                                                        MD5

                                                        579a63bebccbacab8f14132f9fc31b89

                                                        SHA1

                                                        fca8a51077d352741a9c1ff8a493064ef5052f27

                                                        SHA256

                                                        0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                                                        SHA512

                                                        4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        5659eba6a774f9d5322f249ad989114a

                                                        SHA1

                                                        4bfb12aa98a1dc2206baa0ac611877b815810e4c

                                                        SHA256

                                                        e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                                                        SHA512

                                                        f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        5404286ec7853897b3ba00adf824d6c1

                                                        SHA1

                                                        39e543e08b34311b82f6e909e1e67e2f4afec551

                                                        SHA256

                                                        ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                                                        SHA512

                                                        c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        5eb39ba3698c99891a6b6eb036cfb653

                                                        SHA1

                                                        d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                                                        SHA256

                                                        e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                                                        SHA512

                                                        6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        7187cc2643affab4ca29d92251c96dee

                                                        SHA1

                                                        ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                                        SHA256

                                                        c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                                        SHA512

                                                        27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        b7d1e04629bec112923446fda5391731

                                                        SHA1

                                                        814055286f963ddaa5bf3019821cb8a565b56cb8

                                                        SHA256

                                                        4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                                        SHA512

                                                        79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        0dc4014facf82aa027904c1be1d403c1

                                                        SHA1

                                                        5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                                        SHA256

                                                        a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                                        SHA512

                                                        cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                                        Filesize

                                                        3.3MB

                                                        MD5

                                                        cea368fc334a9aec1ecff4b15612e5b0

                                                        SHA1

                                                        493d23f72731bb570d904014ffdacbba2334ce26

                                                        SHA256

                                                        07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                                        SHA512

                                                        bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\in.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        83d75087c9bf6e4f07c36e550731ccde

                                                        SHA1

                                                        d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                                                        SHA256

                                                        46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                                                        SHA512

                                                        044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                                                      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                        Filesize

                                                        3.3MB

                                                        MD5

                                                        045b0a3d5be6f10ddf19ae6d92dfdd70

                                                        SHA1

                                                        0387715b6681d7097d372cd0005b664f76c933c7

                                                        SHA256

                                                        94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                        SHA512

                                                        58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                        Filesize

                                                        440B

                                                        MD5

                                                        3626532127e3066df98e34c3d56a1869

                                                        SHA1

                                                        5fa7102f02615afde4efd4ed091744e842c63f78

                                                        SHA256

                                                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                        SHA512

                                                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        479KB

                                                        MD5

                                                        09372174e83dbbf696ee732fd2e875bb

                                                        SHA1

                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                        SHA256

                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                        SHA512

                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                        Filesize

                                                        13.8MB

                                                        MD5

                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                        SHA1

                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                        SHA256

                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                        SHA512

                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        ed905397a4a3c2e1c16c9b15e1679f61

                                                        SHA1

                                                        dc2edb793d28139128cda8d0697c4e9a602cc81a

                                                        SHA256

                                                        99411f58e8f4f85f3b40b85b9f30f6a1b90d515b89edaf874dafca2f7afa32f9

                                                        SHA512

                                                        6412a5a80d095e9ae059806e397a1cfcfc63ed8a0f4f89a8fd32648fff12e5d4f1f6bd2c7edaf4200477e3b42e68253b3af3655d6e429990a92f6250c9b99a8a

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        a66543601cd530a5da914112ae97d081

                                                        SHA1

                                                        9732bcff8b9aaa41762afa34833ed79276198cd5

                                                        SHA256

                                                        c981fbed1befd20731dafaffc6e43ea5b74bbbb858340f1f0a78962d7bb10d1b

                                                        SHA512

                                                        be0816b18b3b68609ee09c2c4bf10bd19fccb373ecdad6b16980383e3f918b7a7627ce578fc22503fd9f4ffc9adb4da31452eecbc338023812aa50757afe4405

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        24KB

                                                        MD5

                                                        950141df24312865916170891bd332b3

                                                        SHA1

                                                        b8e3e41522176e5e071cfd29f946f42802d77595

                                                        SHA256

                                                        dc7e6e82b75594ae7487d4d72e1640b0769fccfd378171f34b68996b5061d6e3

                                                        SHA512

                                                        bbce2405d6f5563b5487efeead61010b400ec3366d3d8993d64a1096f283dd932abf2889419efdf021068b63eca36e3d194c09f2c68bbe61e7b423c2bb588cbd

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        21KB

                                                        MD5

                                                        9a2a2487eb2109fe7a0b973ee6d9829f

                                                        SHA1

                                                        c0029656e0d36d88d66e8378a516129a871530e6

                                                        SHA256

                                                        b9cb459555459aa6cb33b451dc6a5d223ba4c7e4549ca63c95969705b120f7b1

                                                        SHA512

                                                        d94d41db8f570a76df8eaac97401ae5a1f06fdbecbf33b64efb995e0c8311b28f44dd012a826f3b803d77d4f39a7f77d05ea5a8c62ac3df801dd6a81bf315c5e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        d90c6e073bf08aa9523fe92a602c919f

                                                        SHA1

                                                        191d088f534b692dac53dbabf38fd9e8b13b5fb3

                                                        SHA256

                                                        3b4b669ed90e163607b0e8f38bd2ff161ef8afba2b17085f32a4d1194b138d2d

                                                        SHA512

                                                        b11403fac4a16d6563061f279d604a2ede0b90015ce1826c8c452d6b7f26edc3f5ad91093d01296c775990a66e0afb40d4763067da2421591853a12a7ee5e29a

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a4b9859e-7ddd-4e26-8484-90fedfa7de9c

                                                        Filesize

                                                        982B

                                                        MD5

                                                        482cc21c66d8a6a4b6fa0124967ae3a8

                                                        SHA1

                                                        db789c09606fc716d445224e21e8f0a111a695b4

                                                        SHA256

                                                        3cd01e19232806a870fd62911d45631ed9b149f57650d089b9fa50d596b98f84

                                                        SHA512

                                                        1cb94faa989af8c01ece2717319722c4cb582292cdcde2f15f9b3a268108f77588b0b40cfb344da92549bc889e850f0868524ab19ec4916e50e4e9c793f090e8

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\e3a0cfb9-2209-4392-8a24-02fa387445ca

                                                        Filesize

                                                        659B

                                                        MD5

                                                        103bbb61258f49837ef93faed3b81b44

                                                        SHA1

                                                        3390496c3b97d69d622c72018d223042c446cd82

                                                        SHA256

                                                        f01e04df5044437a51a6bd9ad2212630e599fb6f52dd2fbc6bf948b97ea6c321

                                                        SHA512

                                                        ca35c4a5e4271ac89f9bbaafad6a41cb93c3023c651d91a729b33db0dbb51af3f256af265a4a81e4928e412eedeb4a59542fc9824902d5f898219f7d413e7112

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        842039753bf41fa5e11b3a1383061a87

                                                        SHA1

                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                        SHA256

                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                        SHA512

                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                        SHA1

                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                        SHA256

                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                        SHA512

                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                        Filesize

                                                        372B

                                                        MD5

                                                        bf957ad58b55f64219ab3f793e374316

                                                        SHA1

                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                        SHA256

                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                        SHA512

                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                        Filesize

                                                        17.8MB

                                                        MD5

                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                        SHA1

                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                        SHA256

                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                        SHA512

                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        429a2d7ae254d73ced57b8b6f9f915fa

                                                        SHA1

                                                        daaa9da7900bd6aaabb06770a69a732c10cd2ea6

                                                        SHA256

                                                        c3e6f958f95aca1dbafbef8b825e95790c561de66ba842cc3a98b842bc577743

                                                        SHA512

                                                        bc50a55eb95d4ba56609cf7837e45148f88c0dce28f5d5aa1c8901426e63d4c19bc610ed0fd9a6228a41b6a0c4f6a63f755e75be60c1b5d374cfe7ff775776e3

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        cccf608d8b3098aaac4f2fb9add62a95

                                                        SHA1

                                                        9f44df9cf545bbd8991e6026884f1f83ac0ea2eb

                                                        SHA256

                                                        7fac91f436b1b80db708158719b32d001d13d9864986f1deb0bff454c85b706c

                                                        SHA512

                                                        7ba2f79ba222f34b3012ba0d355b659cc425f4f8e7436f2ba7fcb3b56374b75fe29b6bf807a13b78e3670e355da76718ce6ea8274a1800fd35bde8dedbcc335e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        d8fd7cdf18b0eb529697e21aef6d062d

                                                        SHA1

                                                        6207f9afa51ec6f8849ccd66f25297caae8f5034

                                                        SHA256

                                                        479ea7caee30b55742c109274deaab05329f0f11c79f226926d69833279f93a0

                                                        SHA512

                                                        9390cbb68ddaf83adca782b0b875cc9a45552d5e92ec0f34997f8d411b7e2610e8172fb393027f6ad429616b77715153e67e439ec132e218d797d09abf4a6b3d

                                                      • memory/216-998-0x0000000000400000-0x000000000064B000-memory.dmp

                                                        Filesize

                                                        2.3MB

                                                      • memory/408-63-0x0000000000A80000-0x0000000000F0B000-memory.dmp

                                                        Filesize

                                                        4.5MB

                                                      • memory/408-62-0x0000000000A80000-0x0000000000F0B000-memory.dmp

                                                        Filesize

                                                        4.5MB

                                                      • memory/1104-199-0x0000000000420000-0x0000000000ABD000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/1104-976-0x0000000000420000-0x0000000000ABD000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/1104-556-0x0000000000420000-0x0000000000ABD000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/1104-611-0x0000000000420000-0x0000000000ABD000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/1104-200-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                        Filesize

                                                        972KB

                                                      • memory/1104-1106-0x0000000000420000-0x0000000000ABD000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/3668-3629-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/3700-151-0x00007FF6CEC50000-0x00007FF6CF0E0000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/3700-153-0x00007FF6CEC50000-0x00007FF6CF0E0000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/4208-1028-0x00007FF7DACA0000-0x00007FF7DB130000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/4208-1041-0x00007FF7DACA0000-0x00007FF7DB130000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/4380-2-0x00000000003D1000-0x00000000003FF000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/4380-3-0x00000000003D0000-0x00000000006DD000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4380-17-0x00000000003D0000-0x00000000006DD000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4380-1-0x0000000077E44000-0x0000000077E46000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/4380-0-0x00000000003D0000-0x00000000006DD000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4380-4-0x00000000003D0000-0x00000000006DD000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4568-180-0x0000000000EA0000-0x000000000134C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/4568-183-0x0000000000EA0000-0x000000000134C000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/4580-20-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-999-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-18-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-1333-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-21-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-22-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-23-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-40-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-2886-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-19-0x00000000005E1000-0x000000000060F000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/4580-3627-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-150-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-254-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-680-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-60-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-3626-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-3621-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-44-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4580-3616-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4588-1030-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1031-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1035-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1036-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1040-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1033-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1038-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1039-0x00000000024D0000-0x00000000024F0000-memory.dmp

                                                        Filesize

                                                        128KB

                                                      • memory/4588-1042-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1032-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1034-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4588-1029-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/4700-1021-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4700-1027-0x00000000005E0000-0x00000000008ED000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/4868-38-0x0000000000FD0000-0x000000000145B000-memory.dmp

                                                        Filesize

                                                        4.5MB

                                                      • memory/4868-41-0x0000000005160000-0x0000000005161000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/4868-43-0x0000000000FD0000-0x000000000145B000-memory.dmp

                                                        Filesize

                                                        4.5MB

                                                      • memory/4868-53-0x0000000000FD0000-0x000000000145B000-memory.dmp

                                                        Filesize

                                                        4.5MB

                                                      • memory/4868-42-0x0000000000FD1000-0x0000000000FF6000-memory.dmp

                                                        Filesize

                                                        148KB

                                                      • memory/5108-164-0x0000024CF8670000-0x0000024CF8692000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/5340-683-0x0000000000400000-0x0000000000457000-memory.dmp

                                                        Filesize

                                                        348KB

                                                      • memory/5340-681-0x0000000000400000-0x0000000000457000-memory.dmp

                                                        Filesize

                                                        348KB

                                                      • memory/5424-1090-0x0000000000300000-0x000000000060D000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5424-1071-0x0000000000300000-0x000000000060D000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5716-3642-0x00007FF7DACA0000-0x00007FF7DB130000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/5836-3639-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/5836-3641-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/6012-747-0x00000000001B0000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/6012-557-0x00000000001B0000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/6012-601-0x00000000001B0000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/6012-602-0x00000000001B0000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/6012-924-0x00000000001B0000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        2.7MB