Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 09:13

General

  • Target

    file.exe

  • Size

    2.9MB

  • MD5

    bce8d1c24aaa492237eef8ab39403025

  • SHA1

    22080faaa8259eed4723eee0d045890e866b9d8d

  • SHA256

    a5e65380e98c1f0a3f8552bcd35090f14cfb74973ed39b7b5482d3d42a78e08a

  • SHA512

    d1bcf783c8440d1186ac765ae524f3d9be91fb09ab2ba3b2a93059111668dcbde8cb0f666617bae33b5d862ec763a19dbaa63da223d8e052f28245e1417145fd

  • SSDEEP

    49152:59M5PDq9UpDX3WamgOuWAu0OTm7bp9ZQ1Lwp4lyQ9J0K:59KPDUUpLJmgOpAuz2bp9ZewpIyQ3

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 5 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 17 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 58 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Users\Admin\AppData\Local\Temp\1019249001\ec03d71ff9.exe
        "C:\Users\Admin\AppData\Local\Temp\1019249001\ec03d71ff9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4236
        • C:\Users\Admin\AppData\Local\Temp\1019249001\ec03d71ff9.exe
          "C:\Users\Admin\AppData\Local\Temp\1019249001\ec03d71ff9.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1472
      • C:\Users\Admin\AppData\Local\Temp\1019250001\d83d6e2ab3.exe
        "C:\Users\Admin\AppData\Local\Temp\1019250001\d83d6e2ab3.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move App App.cmd & App.cmd
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3812
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2016
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1620
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1800
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4916
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 245347
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2688
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "profiles" Organizing
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4284
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Judy + ..\Sheets + ..\Another + ..\Wanting b
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4416
          • C:\Users\Admin\AppData\Local\Temp\245347\Dry.com
            Dry.com b
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1344
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\245347\Dry.com" & rd /s /q "C:\ProgramData\F3E37GL6XLN7" & exit
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3984
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2512
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4156
      • C:\Users\Admin\AppData\Local\Temp\1019251001\1fae834b73.exe
        "C:\Users\Admin\AppData\Local\Temp\1019251001\1fae834b73.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:4132
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4056
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:864
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1472
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4248
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3248
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1644
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4072
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4092
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:2976
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              PID:1796
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:1724
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:2016
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2892
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4916
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4064
        • C:\Users\Admin\AppData\Local\Temp\1019252001\90537208c7.exe
          "C:\Users\Admin\AppData\Local\Temp\1019252001\90537208c7.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3388
        • C:\Users\Admin\AppData\Local\Temp\1019253001\0eabe3d11e.exe
          "C:\Users\Admin\AppData\Local\Temp\1019253001\0eabe3d11e.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4864
        • C:\Users\Admin\AppData\Local\Temp\1019254001\02cb9e02fc.exe
          "C:\Users\Admin\AppData\Local\Temp\1019254001\02cb9e02fc.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3284
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Add-MpPreference -ExclusionPath "C:\xmcnsf"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5620
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5064
          • C:\xmcnsf\34665c058a8b481eaf3a6aed2017bd40.exe
            "C:\xmcnsf\34665c058a8b481eaf3a6aed2017bd40.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1164
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\xmcnsf\34665c058a8b481eaf3a6aed2017bd40.exe" & rd /s /q "C:\ProgramData\68GVASJ5PH4E" & exit
              5⤵
              • System Location Discovery: System Language Discovery
              PID:5328
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                6⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:4076
          • C:\xmcnsf\19ba26f47ae14088b1d87179fb522895.exe
            "C:\xmcnsf\19ba26f47ae14088b1d87179fb522895.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:5612
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi
              5⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:5188
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb21c46f8,0x7ffbb21c4708,0x7ffbb21c4718
                6⤵
                  PID:5892
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                  6⤵
                    PID:2688
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
                    6⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3812
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
                    6⤵
                      PID:6040
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                      6⤵
                        PID:5212
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                        6⤵
                          PID:5488
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:8
                          6⤵
                            PID:6004
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:8
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3572
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1
                            6⤵
                              PID:6140
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                              6⤵
                                PID:6112
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                                6⤵
                                  PID:5448
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4559011494763056379,1265541369727955650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                  6⤵
                                    PID:5860
                            • C:\Users\Admin\AppData\Local\Temp\1019255001\acc0216925.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019255001\acc0216925.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2132
                            • C:\Users\Admin\AppData\Local\Temp\1019256001\6a86315d80.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019256001\6a86315d80.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2316
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 636
                                4⤵
                                • Program crash
                                PID:5688
                            • C:\Users\Admin\AppData\Local\Temp\1019257001\fb7ad6c976.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019257001\fb7ad6c976.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5264
                            • C:\Users\Admin\AppData\Local\Temp\1019258001\41caa6d23a.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019258001\41caa6d23a.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Loads dropped DLL
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1692
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                4⤵
                                • Uses browser remote debugging
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:6068
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb558cc40,0x7ffbb558cc4c,0x7ffbb558cc58
                                  5⤵
                                    PID:4328
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2116,i,17579222885615283456,17747709908860103478,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:2
                                    5⤵
                                      PID:5096
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1848,i,17579222885615283456,17747709908860103478,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:3
                                      5⤵
                                        PID:1188
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,17579222885615283456,17747709908860103478,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2372 /prefetch:8
                                        5⤵
                                          PID:5988
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,17579222885615283456,17747709908860103478,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:1
                                          5⤵
                                          • Uses browser remote debugging
                                          PID:4516
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,17579222885615283456,17747709908860103478,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                                          5⤵
                                          • Uses browser remote debugging
                                          PID:5336
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,17579222885615283456,17747709908860103478,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:1
                                          5⤵
                                          • Uses browser remote debugging
                                          PID:2288
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                        4⤵
                                        • Uses browser remote debugging
                                        • Enumerates system info in registry
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        PID:5584
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb6c946f8,0x7ffbb6c94708,0x7ffbb6c94718
                                          5⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          PID:5256
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
                                          5⤵
                                            PID:5376
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
                                            5⤵
                                              PID:5996
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3008 /prefetch:8
                                              5⤵
                                                PID:508
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:1624
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:2680
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:6628
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:6612
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
                                                5⤵
                                                  PID:6928
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
                                                  5⤵
                                                    PID:2784
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2688 /prefetch:2
                                                    5⤵
                                                      PID:1172
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=5024 /prefetch:2
                                                      5⤵
                                                        PID:5060
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=5036 /prefetch:2
                                                        5⤵
                                                          PID:6284
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2188 /prefetch:2
                                                          5⤵
                                                            PID:4940
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15086857411546649659,15217754575192055281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2416 /prefetch:2
                                                            5⤵
                                                              PID:756
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\DGIJEGHDAE.exe"
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6600
                                                            • C:\Users\Admin\Documents\DGIJEGHDAE.exe
                                                              "C:\Users\Admin\Documents\DGIJEGHDAE.exe"
                                                              5⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6516
                                                        • C:\Users\Admin\AppData\Local\Temp\1019259001\34de00056f.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1019259001\34de00056f.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:5980
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM firefox.exe /T
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5728
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM chrome.exe /T
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6636
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM msedge.exe /T
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6736
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM opera.exe /T
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6832
                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                            taskkill /F /IM brave.exe /T
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6912
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                            4⤵
                                                              PID:6972
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                5⤵
                                                                • Checks processor information in registry
                                                                • Modifies registry class
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:7024
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e88f5c31-fc25-4639-8dfc-152a7d6fb6b5} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" gpu
                                                                  6⤵
                                                                    PID:6196
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2376 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c806ed81-fbab-4cca-af74-7dcef969441d} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" socket
                                                                    6⤵
                                                                      PID:4436
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3448 -childID 1 -isForBrowser -prefsHandle 3392 -prefMapHandle 3280 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab16464f-752e-4be8-9b5c-a13eb843782c} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" tab
                                                                      6⤵
                                                                        PID:6732
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2912 -childID 2 -isForBrowser -prefsHandle 2756 -prefMapHandle 2932 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7953af0a-1d70-4edb-bb49-efa6ff2f135d} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" tab
                                                                        6⤵
                                                                          PID:5304
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4944 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4936 -prefMapHandle 4932 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9499e873-d9bb-4d77-8a11-576f689f470e} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" utility
                                                                          6⤵
                                                                          • Checks processor information in registry
                                                                          PID:5208
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 3 -isForBrowser -prefsHandle 5328 -prefMapHandle 4772 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3f70f08-289b-4d66-8c15-76b7fe6e2320} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" tab
                                                                          6⤵
                                                                            PID:7008
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 4 -isForBrowser -prefsHandle 5484 -prefMapHandle 5488 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3add9c5a-30c8-404a-9984-80645e9f0fdc} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" tab
                                                                            6⤵
                                                                              PID:7004
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5668 -prefMapHandle 5672 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bd0d878-41d8-49c8-bca6-6b5b874cb5e5} 7024 "\\.\pipe\gecko-crash-server-pipe.7024" tab
                                                                              6⤵
                                                                                PID:7116
                                                                        • C:\Users\Admin\AppData\Local\Temp\1019260001\c80fd5a129.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1019260001\c80fd5a129.exe"
                                                                          3⤵
                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Windows security modification
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:7136
                                                                        • C:\Users\Admin\AppData\Local\Temp\1019261001\6cf718e43e.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1019261001\6cf718e43e.exe"
                                                                          3⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1724
                                                                        • C:\Users\Admin\AppData\Local\Temp\1019262001\4569ee9a13.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1019262001\4569ee9a13.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:6880
                                                                          • C:\Users\Admin\AppData\Local\Temp\1019262001\4569ee9a13.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\1019262001\4569ee9a13.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5340
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:5876
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:5848
                                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                          1⤵
                                                                            PID:6036
                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                            1⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:6244
                                                                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:6444
                                                                            • C:\Windows\explorer.exe
                                                                              explorer.exe
                                                                              2⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:6460
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                              2⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:6516
                                                                              • C:\Windows\system32\PING.EXE
                                                                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                3⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:6840
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2316 -ip 2316
                                                                            1⤵
                                                                              PID:920
                                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                              1⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              PID:5576
                                                                            • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                              C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              PID:5248
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                2⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5968
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                                2⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2132
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                  3⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:5808

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\ProgramData\GCGHCBKFCFBFHIDHDBFC

                                                                              Filesize

                                                                              10KB

                                                                              MD5

                                                                              328a8e5039d62e077eb5eadad4ec558d

                                                                              SHA1

                                                                              62201d24ab697d6e036c5c614e942715881faf22

                                                                              SHA256

                                                                              047293ca55d697f0fa38dc25e5bd55d4902bf8fad24c97a42276f6a6fbbc0f3e

                                                                              SHA512

                                                                              75ba91d5d92696604524752be8468261e05a7dd151e3020859ca53b896d781d67e7c701587edd3fab4c525859e3f8869d87733a9860b95cde03f7c7a01fb4f12

                                                                            • C:\ProgramData\mozglue.dll

                                                                              Filesize

                                                                              593KB

                                                                              MD5

                                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                                              SHA1

                                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                              SHA256

                                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                              SHA512

                                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                              Filesize

                                                                              2B

                                                                              MD5

                                                                              d751713988987e9331980363e24189ce

                                                                              SHA1

                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                              SHA256

                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                              SHA512

                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ec03d71ff9.exe.log

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              8ec831f3e3a3f77e4a7b9cd32b48384c

                                                                              SHA1

                                                                              d83f09fd87c5bd86e045873c231c14836e76a05c

                                                                              SHA256

                                                                              7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                                                                              SHA512

                                                                              26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                              Filesize

                                                                              284B

                                                                              MD5

                                                                              916a7108a9504f94543024667df248e0

                                                                              SHA1

                                                                              631da0af354973d67039c82d6900c172ce3703f7

                                                                              SHA256

                                                                              729737699cb48bdb4795baf4e8d04c8d8577315151debc8acab17c402b56eed5

                                                                              SHA512

                                                                              560cde39f3ba3f13256cdc0b0b8b853a2a71594dff4a112259b59b34e99547625ad4a931242a8229b8d288c1c01a5ce3c7300a680079e2d819fd974426193372

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                              Filesize

                                                                              954B

                                                                              MD5

                                                                              f6391b9c5b4335436e7f4eb93ad0e52c

                                                                              SHA1

                                                                              abd678bae0670760c40e5650d9643305bd23881c

                                                                              SHA256

                                                                              8b9674bc9f13ca9dc786802e802c6fa85c6c4ad236f95477666145f468a1c105

                                                                              SHA512

                                                                              3c3263c9833f03a6482cba3d5a8ea8c6d06a32b31d1474dd7043a1b97401821afed5e22e2172162ea521794c234e9ffd8b95ef25e6d7617abf718275b0c72e56

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\01e3e956-b071-48a0-b7cf-6b8490d36c1b.dmp

                                                                              Filesize

                                                                              838KB

                                                                              MD5

                                                                              77c824e17287618cd925d263842e6e50

                                                                              SHA1

                                                                              80d572eb727a09bd647e5139d2a77bf802c19e61

                                                                              SHA256

                                                                              c5d41d889cb704048ca75feb56756413112d7ee8aa16e12777f2130c4b6916f9

                                                                              SHA512

                                                                              534ae5fc1e494f94510fff0f4eb1e3eee304b8784ea40c88d7c9e9d8f7277870b1fdaf43dd51b90faa07262694f521bc5a2d8e32412bf5b6a79df18812531bcb

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\12e0a160-b49a-416c-8efb-36c664aa8137.dmp

                                                                              Filesize

                                                                              830KB

                                                                              MD5

                                                                              19f640e85291c7c18f6dcbd70cb9c8f4

                                                                              SHA1

                                                                              7f2d1778c5d81153748ab2563777ff644f972797

                                                                              SHA256

                                                                              768a287508d4ab61dd0e5ba116b0a27d824a6c2a5d3853e62f82ea4b34d770a7

                                                                              SHA512

                                                                              6be63175bef56813f99cd1d2ee578f37c110a5b80da229f3182a372ad0243d98674bb1c383ae5e3d7c526efa6df20bcc6cf6831d26efffa759969fa25fa39088

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1574d912-b795-4617-9853-24b114a7c48d.dmp

                                                                              Filesize

                                                                              826KB

                                                                              MD5

                                                                              188a3969c5bd012f11bbbfffb5a7a6c6

                                                                              SHA1

                                                                              61a6af7b3d6460e3e1d5277a057bf60b5fbd8c62

                                                                              SHA256

                                                                              0ee952564b315207b8914326f9ffe954c0441246f4421bbe852f7a2aaceb28f9

                                                                              SHA512

                                                                              54b131581ff12e0b54c43a10623342868e162542616fdf5375f0d2bb5179072e0b55af69a2f44f17d60f6465c22e535f060ec9265e18b49ab5a8b821446cf871

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\4383ee17-c291-4d85-9b10-8bd6abde5b87.dmp

                                                                              Filesize

                                                                              826KB

                                                                              MD5

                                                                              9fa33eafe965db2570435eee83dfacfd

                                                                              SHA1

                                                                              671ae8c9b923f28ef15679bd6c1a8738a22058c4

                                                                              SHA256

                                                                              5a19b4cd358f935d4ce08a4f36e083f47ee553694ae7e43e10b844e8fac23940

                                                                              SHA512

                                                                              0483ddd278273b92d585b27e7dd3f8ac159c564467aed31a8069ca96f8f1a3372f86352fd21304e065a1a0143131ac42d7c3c069caff777bc562db8812aa7429

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\44206016-9d38-4ef1-926a-1a5c855ee431.dmp

                                                                              Filesize

                                                                              838KB

                                                                              MD5

                                                                              23f290981c6c1f25dc2f27d8cba3a84c

                                                                              SHA1

                                                                              d59e8f1bfd24be05edf125970953902f7eff4698

                                                                              SHA256

                                                                              5d310255cec425476921b450921ec8b8d1c4fe2a19a7442e3d84edc59bca5f7c

                                                                              SHA512

                                                                              a5f3f14a1cf939e6bfdfeb65a21f73de7379754e5619196bb8f925a5fe4b907fa807f03bb514ce294a445737f8bb0599bb25ff38e79cef404ef39e3f551a7f35

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\91dc7d42-2534-45a3-be91-ebe80cff23da.dmp

                                                                              Filesize

                                                                              838KB

                                                                              MD5

                                                                              236ac54e56e7866c6407936bc69ce950

                                                                              SHA1

                                                                              a30462ea5ce4847f1015a142a9199f9a6fd51b33

                                                                              SHA256

                                                                              85d63086526bd752cbf6fe28f874f9cc9246d8d8c1d2b28f62cddc2230c43d5b

                                                                              SHA512

                                                                              580cd3c98a02c0ca2c8a0459d64ce0d2c60ec75e36f76954695e23ee7a3302298b2dad524618257d45e55da23a89253f5f866113a1132da6eca156b55af4ab36

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e2e7a3f9-03d2-4c1e-8006-e8b9d34d6509.dmp

                                                                              Filesize

                                                                              826KB

                                                                              MD5

                                                                              add347b412b5f4e83f00ad5d71496b27

                                                                              SHA1

                                                                              5e25eac5a3d7c1663f0396a43cdeda7c1322d989

                                                                              SHA256

                                                                              73f049e4fab1fd411f5d9515b92f858fdc895d5c62d1ffc0b1489b947d628b5a

                                                                              SHA512

                                                                              3c526b2b0533c114a64bc056618ef002c85201ac6492c04910f30ec44f9754db9e25b7f99da1d2ab332429e9eacbc70975a2d8c2a93edcf0db962b1c81d2f10b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              61cef8e38cd95bf003f5fdd1dc37dae1

                                                                              SHA1

                                                                              11f2f79ecb349344c143eea9a0fed41891a3467f

                                                                              SHA256

                                                                              ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                                                              SHA512

                                                                              6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              0a9dc42e4013fc47438e96d24beb8eff

                                                                              SHA1

                                                                              806ab26d7eae031a58484188a7eb1adab06457fc

                                                                              SHA256

                                                                              58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                                                              SHA512

                                                                              868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              812ae7ae1c628db6eec6525b638970f8

                                                                              SHA1

                                                                              839d828d062795fcd129ab8efda62bcec7f78e04

                                                                              SHA256

                                                                              d978a711c1119de50e07eb6fe48b2c517bbbde8622438c1ceb23c27fed9b4631

                                                                              SHA512

                                                                              9a6cdeb55e2f5d4b33821359dc64a1512662fc2b13bba773ba0c1ba688e8369cc87cdb74f39d8506359e98c35afce5f3f31aba19dc75ad6651c1c342576f7a84

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              3f2dd31a7f89be34a163f17c5a6c09af

                                                                              SHA1

                                                                              a5144d0de7fd2d007b35cab7ef01a0aca61995e9

                                                                              SHA256

                                                                              399ca04ec500f256387970a60071fe4c10150dae63792d42af451e9c257694a6

                                                                              SHA512

                                                                              c76b71d55b0f5d37a7ff8b6e76c4ec6a69f90aaaf0af75b1858df54e4a9a8bbc4b118dfde43163464a8b6a4b0b0859c8ee0f846f1c6713ecf3045dbd2c41f5d6

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              86c3ea619d1fe550f81ec0f947ba4ed3

                                                                              SHA1

                                                                              04dde47305db35c9b9fb135ec9576ff51a7f35c2

                                                                              SHA256

                                                                              e3fe0af0d60cc80250b327aecc9fc8e7c2139a082ae58bb26f3af0b8bfabc853

                                                                              SHA512

                                                                              509bc1c13e74a5f6593522ff556b26ef72fc194508f9061165041778c3311501b1469d0caa6c138bd3cda568ad9aca1bae0072c31627c2b36977870aa91a8900

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\99bf96cb-7904-42c2-b3b1-fc9b9e7b60d7.tmp

                                                                              Filesize

                                                                              1B

                                                                              MD5

                                                                              5058f1af8388633f609cadb75a75dc9d

                                                                              SHA1

                                                                              3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                              SHA256

                                                                              cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                              SHA512

                                                                              0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              fa8edbdd948c216e91bdad95dc8a62ee

                                                                              SHA1

                                                                              9b13f7cc4cca0b9a449f23f60bf22b8481ef65ef

                                                                              SHA256

                                                                              a5bed46490b68dd5a006c67274020c10e3551ee09b8c9dc6aba4e042702642e3

                                                                              SHA512

                                                                              5e2febf60d458cfa8f85c925d8965a389b1e048b2703729e62d82d855fc37d57ae900e2c9c0d659e4e7c7c88962889a38715e31eaf1b59c8e8e2c448b408856c

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              ff7f14e61e6f9554f25c4d97f0dc022a

                                                                              SHA1

                                                                              583eb8eccd0119b6471d2270dd3f4c40794d56fa

                                                                              SHA256

                                                                              5874b535bd262379d760a8948fda7a13b1cc3b0125c2b471e07de85b9b5f7684

                                                                              SHA512

                                                                              68e70d0d055072bd77524d3a612918f9c3b49a90066713c70413ea9ac6088d3be7f5374cb86df4122d7f60adeda1116426a327a52dbfaa7c72442fc3bf2e4b10

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                                              Filesize

                                                                              109B

                                                                              MD5

                                                                              cd6ed77e85e56c4625eac4cf1b1eb7d2

                                                                              SHA1

                                                                              1151e01205615f17b2f1be4b71b202ebc0bb186e

                                                                              SHA256

                                                                              6af82cb8c59255abc37303dca9f59437d83f33e54ad1f57cd337331296d27791

                                                                              SHA512

                                                                              6f85b4acf176f17cbbefbf48f6a7aad38e863a2aa09aef46dadf290054923a0b5533230546adf0067e98610af72d0acc8f670effc4cb197996f0eed0fcb07dd8

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                                              Filesize

                                                                              204B

                                                                              MD5

                                                                              0ee71293560d71e3fb84e38b061c73dd

                                                                              SHA1

                                                                              f05ae0a7be1a25d3818287c8a36589564019a2a2

                                                                              SHA256

                                                                              f449143d82fad41e820366f17f89e0450c0147868a801b28ddd989ec64e722c5

                                                                              SHA512

                                                                              826fb487e0a223c73705d98391ed4bd10bdc0e08008e65da911a9d13cdbb7c54a8f39fb4455daf8949b1c2c13d2928552e8069af2b054a5c92ec52716464cbd0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                              SHA1

                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                              SHA256

                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                              SHA512

                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                              Filesize

                                                                              264KB

                                                                              MD5

                                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                                              SHA1

                                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                              SHA256

                                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                              SHA512

                                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8B3ZU6S9\download[1].htm

                                                                              Filesize

                                                                              1B

                                                                              MD5

                                                                              cfcd208495d565ef66e7dff9f98764da

                                                                              SHA1

                                                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                              SHA256

                                                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                              SHA512

                                                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              a22cf77d7947ac392ae5779d0608b522

                                                                              SHA1

                                                                              1e9fb563c65c32bdd281c7ce03656380ad7bf3c8

                                                                              SHA256

                                                                              223fbe786af13ce756e33adb3559e2403a823e49fc4f0af619cdc4359951e7d7

                                                                              SHA512

                                                                              3df9e8ae251b6b3988a6c60ff86e8986f5a59277188518146e3c14161043ba78e3fa93de89276daab11c116fa79ef2349456fd84f8273808176503c84a96ab22

                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31

                                                                              Filesize

                                                                              13KB

                                                                              MD5

                                                                              dbb837b711e19e54bdd8e16df2a13cd9

                                                                              SHA1

                                                                              4f820ac60cb90e841c21fe5393f3288f290c19e6

                                                                              SHA256

                                                                              3c612c5f1bede5ea2eae10338c5ee19e9ead0d5d67c21dce2e390eb0fb1c519f

                                                                              SHA512

                                                                              56e7e0561aca3175de23d4aabe789f31a918626e13b523e49ff6d08c76b03e68030720b27acf8f2d680ef9a53cd7ebfe4f5c415be53264bdc5e3b18fb7a83bb3

                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                              Filesize

                                                                              13KB

                                                                              MD5

                                                                              dc7ee0269d64f4464901292bf62b690d

                                                                              SHA1

                                                                              eb661252102fc5610a12caa41a9c46629946f3ad

                                                                              SHA256

                                                                              234dad31665ce9b65b6766b85486a1d85727236ea63bca2a54ad2de7bf5f2de2

                                                                              SHA512

                                                                              df945de4ae4747db9d79f58e3c70c90ed0d820a07cb7c0481545f50c13d816f87837bf57fac2a6519fdd883db3ad6f8f9cc0d51015301981242b1a3971170436

                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              96c542dec016d9ec1ecc4dddfcbaac66

                                                                              SHA1

                                                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                                                              SHA256

                                                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                              SHA512

                                                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019249001\ec03d71ff9.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              ef08a45833a7d881c90ded1952f96cb4

                                                                              SHA1

                                                                              f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                                                                              SHA256

                                                                              33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                                                                              SHA512

                                                                              74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019250001\d83d6e2ab3.exe

                                                                              Filesize

                                                                              842KB

                                                                              MD5

                                                                              8eb4f92605e35c57a42b0917c221d65c

                                                                              SHA1

                                                                              0e64d77ef1b917b3afe512b49710250c71369175

                                                                              SHA256

                                                                              b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085

                                                                              SHA512

                                                                              4cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019251001\1fae834b73.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              3a425626cbd40345f5b8dddd6b2b9efa

                                                                              SHA1

                                                                              7b50e108e293e54c15dce816552356f424eea97a

                                                                              SHA256

                                                                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                              SHA512

                                                                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019252001\90537208c7.exe

                                                                              Filesize

                                                                              4.3MB

                                                                              MD5

                                                                              bc9903cd12a6b359c28e16021909ccb3

                                                                              SHA1

                                                                              1b444289d8df7755f1d779b9862c8e4995ee6d55

                                                                              SHA256

                                                                              072e228bf10d03818ed7869a52bdc386d0bd437923044fb98e2a29ae2ff4591a

                                                                              SHA512

                                                                              40dbe8fe4c2bbb7e1328c1dc4d39f81430fcec995e383703f90aaa48132ed8b01e291f581056eb5812de0b10e483e6e9936ca2a579fae0b2587088c49f13f7d9

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019253001\0eabe3d11e.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              669ed3665495a4a52029ff680ec8eba9

                                                                              SHA1

                                                                              7785e285365a141e307931ca4c4ef00b7ecc8986

                                                                              SHA256

                                                                              2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                                                                              SHA512

                                                                              bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019254001\02cb9e02fc.exe

                                                                              Filesize

                                                                              21KB

                                                                              MD5

                                                                              04f57c6fb2b2cd8dcc4b38e4a93d4366

                                                                              SHA1

                                                                              61770495aa18d480f70b654d1f57998e5bd8c885

                                                                              SHA256

                                                                              51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                                                                              SHA512

                                                                              53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019255001\acc0216925.exe

                                                                              Filesize

                                                                              4.2MB

                                                                              MD5

                                                                              2b39bc094a36c474dea04d0bb8e22356

                                                                              SHA1

                                                                              115e4f12506c0fdf4db9b19c94e526040c94cf02

                                                                              SHA256

                                                                              6bc9ae5b97c21197dbec153f9d9420d7c5976ecf5ad1a40449474c019006db98

                                                                              SHA512

                                                                              d466bf292e13795fe636b39c77a58a03c3ddda5ca4dd26a00db7268f2c12eefb9874b8e3342c31aa2066c017b02f1b86c5a984e5327d5487c2eda4cfa3d98871

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019256001\6a86315d80.exe

                                                                              Filesize

                                                                              1.8MB

                                                                              MD5

                                                                              8f99d6a86bb1b60441b2d0824b2f8a16

                                                                              SHA1

                                                                              bdba27ca8ac199579268260535b2a90a88c63b3b

                                                                              SHA256

                                                                              4360fbed2a0cfcaaecab2a478478a2266fe8df65bfb9fc2876bbdb91ff1add46

                                                                              SHA512

                                                                              30a2f0a07521e61877a8a05a17daf9c378435caa17b42993827d1421a8c57d94e75f97bd3daa582207b1b2874d4f5e70a4cf476f556f39c66bcd6eefc7ad8430

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019257001\fb7ad6c976.exe

                                                                              Filesize

                                                                              1.8MB

                                                                              MD5

                                                                              d96503971b338f5b4db28e9f306a1fad

                                                                              SHA1

                                                                              2b75e6f5537b01ae1fdc43fbc666b4cb300e50cc

                                                                              SHA256

                                                                              c1ddf685bda82f05dd6c3730103fcd0c7bba4d2ef14fcca5e57c622db31873b5

                                                                              SHA512

                                                                              adaa96475e3a4e1392c51f18c86ee296e665fd07c2ab0d55290c3ee9782c326271ce8e8a58f6e15805edae23e03142d12d212aba2179b2ce8be9d41cb23ad87f

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019258001\41caa6d23a.exe

                                                                              Filesize

                                                                              2.7MB

                                                                              MD5

                                                                              39a1cde446dbdfbee85fb538b6a2fecf

                                                                              SHA1

                                                                              e0cba0a970e93d8c4e2febe70a33c2c5b93c50d4

                                                                              SHA256

                                                                              627282708d27b267d9d3cbee3fba2980e3f30c77588b51c71e6afabe435917d0

                                                                              SHA512

                                                                              f5d1927b22011a20dd62c304fd568ede6d19a2e3b41a937d56352d5795a7667989e351c7464c1a909982c4deb0ea3cf586d441b1fdad96c3d6bdeb22d491932a

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019259001\34de00056f.exe

                                                                              Filesize

                                                                              949KB

                                                                              MD5

                                                                              7bd4baf09d12c7cbb2343bec04e564d7

                                                                              SHA1

                                                                              2f82266778edece71ec095020f46d484c66a663f

                                                                              SHA256

                                                                              bc01280d1f4afc112127217a92f448fb3622bc7e70e1456073c1b8a38af5faa3

                                                                              SHA512

                                                                              418f559ec0968b30ec0b6ccf59dcbeda84bd4342d879fbaeaa6fa20fa6dbd2f49d5d574ae38ed420ce343e01d5677294d3ffb777ac88192b0b91da323911f7fb

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019260001\c80fd5a129.exe

                                                                              Filesize

                                                                              2.7MB

                                                                              MD5

                                                                              2ea6bb0dfc1348b335b60bef49cc3883

                                                                              SHA1

                                                                              009c05653f84888d18990b94702b9ca981fc8472

                                                                              SHA256

                                                                              7f570756983d6dce656b5b6f710c569c7ec1a01b30189d2671f5d1a11fbc6cdf

                                                                              SHA512

                                                                              a3bd9fb48ece1041b837168d0174833bb5f44204d0a7d17c850bb6b0c1ce0f6fb96fcf6e3d5c6680fb5d7ca23a394d0c5dd2b42fceaa791a847f8725f6432be3

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019261001\6cf718e43e.exe

                                                                              Filesize

                                                                              1.8MB

                                                                              MD5

                                                                              27c1f96d7e1b72b6817b6efeff037f90

                                                                              SHA1

                                                                              2972cc112fc7e20cbf5952abe07407b8c1fbb2a2

                                                                              SHA256

                                                                              aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d

                                                                              SHA512

                                                                              9a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32

                                                                            • C:\Users\Admin\AppData\Local\Temp\1019262001\4569ee9a13.exe

                                                                              Filesize

                                                                              758KB

                                                                              MD5

                                                                              afd936e441bf5cbdb858e96833cc6ed3

                                                                              SHA1

                                                                              3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                                              SHA256

                                                                              c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                                              SHA512

                                                                              928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                                                            • C:\Users\Admin\AppData\Local\Temp\245347\Dry.com

                                                                              Filesize

                                                                              925KB

                                                                              MD5

                                                                              62d09f076e6e0240548c2f837536a46a

                                                                              SHA1

                                                                              26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                              SHA256

                                                                              1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                              SHA512

                                                                              32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                                            • C:\Users\Admin\AppData\Local\Temp\245347\b

                                                                              Filesize

                                                                              267KB

                                                                              MD5

                                                                              0c7d5f0db7d1be49fc2285c64d3c45aa

                                                                              SHA1

                                                                              942803613a17b0735f80d32dab9be6b87a0e472f

                                                                              SHA256

                                                                              d49d834cb452343c64c7b9716f5b6d6032ce8b81e04995ccd1af130ff863143d

                                                                              SHA512

                                                                              52c3cacdd5a798243bdf191d0f673c63befd5297284e2841de8ef0588b103b1192e60d50e22e5572fa160834be7d052aa328556ed182a1cc56c9be55ab76ccc8

                                                                            • C:\Users\Admin\AppData\Local\Temp\Another

                                                                              Filesize

                                                                              96KB

                                                                              MD5

                                                                              5535aa11bb8a32622dadb4cb7d45071c

                                                                              SHA1

                                                                              76b4b6221174f1b11370d7aa2a89a5996624c7f8

                                                                              SHA256

                                                                              ead59f9d65f7830e35a9c213b07938b7bc57513692ecbcf66b4be4ac82350eba

                                                                              SHA512

                                                                              b14a53ea33b6f44ef4fffb76060955f9ae85bfed79ca206359ffcdf80aa33d21abff41d526e43ba55bc33048fd8a237a2c854e92856f292cb4825304acfbe3bd

                                                                            • C:\Users\Admin\AppData\Local\Temp\App

                                                                              Filesize

                                                                              17KB

                                                                              MD5

                                                                              15687a16a1310bb6dfcb1fb9b8d052b3

                                                                              SHA1

                                                                              bda139691a5c3f90f7059d84dbad98354748832f

                                                                              SHA256

                                                                              08f36da3d5e25c26d14e49bc46995aa1a5842ad368a9e02244db850f77d4a70f

                                                                              SHA512

                                                                              9dfafa0cf6e7a54037cc53c155c7214580a90b4066d3b469a966f53d363ae63a6a4d9bb08a8de64796e8c6b36e6a5e8374069952628a81b13ebfe93abbc51574

                                                                            • C:\Users\Admin\AppData\Local\Temp\Critics

                                                                              Filesize

                                                                              103KB

                                                                              MD5

                                                                              8496cef888ee804f2b8a44171481e40a

                                                                              SHA1

                                                                              90fcde8c353d79ae02bfc946d708d35fedfea64f

                                                                              SHA256

                                                                              0d8671285841832d972ca2576cdb83f412af8433cf33c511f652912e7fd7e29b

                                                                              SHA512

                                                                              158c70a8804e73dfb25a1265328fadc26903c5b035a991aaa570f0ef98f89d616c635e4820e926fb8e00e1c20cfcf3fd441dcc0ca5eefa109dd5bc23e0e4c61d

                                                                            • C:\Users\Admin\AppData\Local\Temp\Doug

                                                                              Filesize

                                                                              114KB

                                                                              MD5

                                                                              37f28bccbcaea4719409c72aa6385586

                                                                              SHA1

                                                                              083ad006b92745c976989bc5fb76e7187d81a597

                                                                              SHA256

                                                                              7101d14a5fcf7b47a9c6b809155bea70121c61d2df7e2244573204c2190ccf45

                                                                              SHA512

                                                                              105de3a0358c0e95b573dd1fc590b27c33f8033158b28a523a5ef9bdbfaa1f488e6b0f7556d6e46d96e23f00392f4eebded0dcea31926a05823ea1b5d4fff22f

                                                                            • C:\Users\Admin\AppData\Local\Temp\Eleven

                                                                              Filesize

                                                                              125KB

                                                                              MD5

                                                                              3b84985152cd93f2bd04bd909d7c902e

                                                                              SHA1

                                                                              4bd3d6af1e4ed7efe357e707ec7e6ab2e3ff4eee

                                                                              SHA256

                                                                              9df8e69068b9ce01749fe0a515db1554c05d491c3a5a4f80f8aba060ea89950f

                                                                              SHA512

                                                                              051d3b9fa3d463d78d1ac971396dcb00d930a9e9c3f7a1278a7dd8027d1ab159f688f912d65d78ada9f059d73526f987a36cac0d5100cae5491959dd059f89dd

                                                                            • C:\Users\Admin\AppData\Local\Temp\Eligibility

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              3efe58b3be584c2afe3d64a453f70dac

                                                                              SHA1

                                                                              ba151bdfa43145dc0e3a495ac5382638cfb0a2c1

                                                                              SHA256

                                                                              7054a53ce5187d3470517170af3138dc28cec4ed1793574a91cca795fb7e3e10

                                                                              SHA512

                                                                              929b0a9af43360af0f820fab936650b211978523b9fdef00ee563930e03f2a9830e5c2246be9ace7f95ab78cfb075e82347cafb02472b8a09dc4859c9a5232f3

                                                                            • C:\Users\Admin\AppData\Local\Temp\Judy

                                                                              Filesize

                                                                              70KB

                                                                              MD5

                                                                              f5c4ea189e763c79767bb2f4bc471f08

                                                                              SHA1

                                                                              6abe10f27aeb64cb3583ec3549d8f84eb23b05eb

                                                                              SHA256

                                                                              49b1a81a6965071db23fe804a6293b87fd2ab96cfda6e28d806c1e76a53e723e

                                                                              SHA512

                                                                              31e79f7a7fc0a5eea3c4d70b152f75573c43c324b317667f41a824ebb2913d7bf4bacbf08a85d6281ec33ada2f2babe2a26d251008288cb6a4ce85e38dbe51d7

                                                                            • C:\Users\Admin\AppData\Local\Temp\Organizing

                                                                              Filesize

                                                                              239B

                                                                              MD5

                                                                              28a97febfc5cd391bec1e2a3d9d938bf

                                                                              SHA1

                                                                              adea302b1d73d65c4c2a64f4f10955d5e4d728aa

                                                                              SHA256

                                                                              2528cd8d1353e6c4dbcc6d2226b5b50ef14027a962a49c4001d2c8c072904773

                                                                              SHA512

                                                                              7bbb7f7781c77740efc6361c5195a01f854c3ca1afd9ec7870c4f87c5a28432af97d61a41e4af0d2d3cea45fa3565e297fc08cd7aca91831792df0a81efe0f82

                                                                            • C:\Users\Admin\AppData\Local\Temp\Origin

                                                                              Filesize

                                                                              63KB

                                                                              MD5

                                                                              7bbdcf2829f157f4178ad1a4ea31bfe6

                                                                              SHA1

                                                                              afc7c5852f104d94fc2726b3230039b696f17fc2

                                                                              SHA256

                                                                              bac794ee8129a6edaa06fed424a8839d24b6b8e6a75c4f23bc8c3e7735498818

                                                                              SHA512

                                                                              d2dd73e8f2b965b9bf9bb806c639af654646d76628e5c707f29ede16a1634dd5a699fb239c83c4bcf492b03e2941129affc777c39b9851f948a96f537dc844ff

                                                                            • C:\Users\Admin\AppData\Local\Temp\Saved

                                                                              Filesize

                                                                              66KB

                                                                              MD5

                                                                              53ab895bb726a4933dd1dc3f2fa2e5f8

                                                                              SHA1

                                                                              3933c015286de1871305ac17679d7244e0c73a07

                                                                              SHA256

                                                                              230c6c15bb57bcb9566d03a0940eb2d8cbb52fd2807cb195982c2541ef7ebbc2

                                                                              SHA512

                                                                              3ffb82fb40e8ff1d98d395601de10beb59af9f77af6300dba79e2436ea787ee7dce026dd43cdda324515f81ec7b5f48e1df396cfc3568128468c3cc5e663682b

                                                                            • C:\Users\Admin\AppData\Local\Temp\Sensor

                                                                              Filesize

                                                                              116KB

                                                                              MD5

                                                                              3b125d59ce5a2cf242a621511a0fb164

                                                                              SHA1

                                                                              3ccba09f214b941931d6169ca9959ace2a72aba7

                                                                              SHA256

                                                                              e4c1fbedc713173bcef5c724f3d64283add852a64f65c87eb3ec8d86c55833aa

                                                                              SHA512

                                                                              c026f9aa8e83f2c888e2b8336c7ec8380d34873956407e32fae31fd72bda741b72c649b7162587435e3d13b9b9fae8e0552330d710831c774264724c8589f36c

                                                                            • C:\Users\Admin\AppData\Local\Temp\Sheets

                                                                              Filesize

                                                                              61KB

                                                                              MD5

                                                                              d947e72346c4ac1aba8bbde8bb791f6f

                                                                              SHA1

                                                                              f6dc2cffbc0b29502cba42d9adee2263a7ff4835

                                                                              SHA256

                                                                              a6e6fc90d3c04e2461e3017e9f1dbaa27abb9278f5db7bb09a218a3a969feb41

                                                                              SHA512

                                                                              61e4a6bfb253d4fcf21781324c6dd7b2dff0750075bfe4ccaffff07a4d2fa552016dfb343bb835bfc7e7d6fd80b2b35b9519f2d6958885502758138bab764e9c

                                                                            • C:\Users\Admin\AppData\Local\Temp\Show

                                                                              Filesize

                                                                              54KB

                                                                              MD5

                                                                              35469ff6842a57bd9788db58a1e1c0cc

                                                                              SHA1

                                                                              47b76f8ae04aeff8cde18e15a6ab9d072214a54a

                                                                              SHA256

                                                                              7006a277a8b2ab82ae4409df94e227083287b7678b9ffe79e2e19d534f1335ec

                                                                              SHA512

                                                                              3b97531e8d41c069dd9a8a6f3fe0fbc498facbb6df823525a726499cf5a4ea40879b7d02138c6d020520df2d59c28efc2f51470bf9aac9f00b6f40101fe51ad0

                                                                            • C:\Users\Admin\AppData\Local\Temp\Silent

                                                                              Filesize

                                                                              50KB

                                                                              MD5

                                                                              04df53fd74b69c92dba8cd83eafa1180

                                                                              SHA1

                                                                              275765d9c7e3300c0b7579ae3de32f658e12945c

                                                                              SHA256

                                                                              db246122e92d7c13ae1050c65c1e1f722f4e98375c9875d719f775cfe1478ee9

                                                                              SHA512

                                                                              44dfa1ccf0c3b054dac3fadba5a87c7c56f318c74dff83810310e349b80029f19a08133c502dd7b65e543b882e567ac19de54f8a520ff073774894f6f8320ef5

                                                                            • C:\Users\Admin\AppData\Local\Temp\Symptoms

                                                                              Filesize

                                                                              52KB

                                                                              MD5

                                                                              7847e23cce3770257dd905024cdc5020

                                                                              SHA1

                                                                              2d2070cb134ccde38544814a1e1e35a08ab95ea6

                                                                              SHA256

                                                                              75f0206860b962d3636015d98c420ec5ebf4023ca7b75b747aeb388aafe9049a

                                                                              SHA512

                                                                              97f5b6924c23343f732ab470b8006ef2b25c92fadb3560fd56db6e53b8daf0c65ce66eb416bd03126c3b1ae6fa2cf66178a487c0eabad24263a3de7253c236b0

                                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp4D31.tmp

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              a10f31fa140f2608ff150125f3687920

                                                                              SHA1

                                                                              ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b

                                                                              SHA256

                                                                              28c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6

                                                                              SHA512

                                                                              cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12

                                                                            • C:\Users\Admin\AppData\Local\Temp\Volunteer

                                                                              Filesize

                                                                              93KB

                                                                              MD5

                                                                              d9ebae5a1b2f513852f89fdc3d31672d

                                                                              SHA1

                                                                              dfa418e6fd3c5b16b685ea0e09cc159a5ff6ed14

                                                                              SHA256

                                                                              b9a3c8e95d261cc9c6b28b58518554120aa2cfa09c2be81c609c0f01b26b313d

                                                                              SHA512

                                                                              d5a9226ea1152566872669c4072bea6498c930e405db45fb6b7b63cd7a807be814c7a71e983851f5d7a66b131319a850ddb10e1d4661d4cacd3082cb5c1caeac

                                                                            • C:\Users\Admin\AppData\Local\Temp\Wanting

                                                                              Filesize

                                                                              40KB

                                                                              MD5

                                                                              6f1a940a0159306f679ff4d03524ae0b

                                                                              SHA1

                                                                              2b48523d0bf3828abd8590e13a03b5946b3d442d

                                                                              SHA256

                                                                              7e294dd8f93a9a7d79fb118070f548d1e8fda62fa96af973e1a950f150b0331e

                                                                              SHA512

                                                                              4ddf0afa24b981bac3ca60cb52af73e39bf7155972f49968c8fc85a17f561208d76158cd117948467176696a0ba87b9ac33658c5e7ef1ef3d4201139e959f932

                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hgidosoa.tfr.ps1

                                                                              Filesize

                                                                              60B

                                                                              MD5

                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                              SHA1

                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                              SHA256

                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                              SHA512

                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                              Filesize

                                                                              2.9MB

                                                                              MD5

                                                                              bce8d1c24aaa492237eef8ab39403025

                                                                              SHA1

                                                                              22080faaa8259eed4723eee0d045890e866b9d8d

                                                                              SHA256

                                                                              a5e65380e98c1f0a3f8552bcd35090f14cfb74973ed39b7b5482d3d42a78e08a

                                                                              SHA512

                                                                              d1bcf783c8440d1186ac765ae524f3d9be91fb09ab2ba3b2a93059111668dcbde8cb0f666617bae33b5d862ec763a19dbaa63da223d8e052f28245e1417145fd

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                              Filesize

                                                                              1.6MB

                                                                              MD5

                                                                              72491c7b87a7c2dd350b727444f13bb4

                                                                              SHA1

                                                                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                              SHA256

                                                                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                              SHA512

                                                                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                              Filesize

                                                                              458KB

                                                                              MD5

                                                                              619f7135621b50fd1900ff24aade1524

                                                                              SHA1

                                                                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                              SHA256

                                                                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                              SHA512

                                                                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                                                              Filesize

                                                                              2.2MB

                                                                              MD5

                                                                              579a63bebccbacab8f14132f9fc31b89

                                                                              SHA1

                                                                              fca8a51077d352741a9c1ff8a493064ef5052f27

                                                                              SHA256

                                                                              0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                                                                              SHA512

                                                                              4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              5659eba6a774f9d5322f249ad989114a

                                                                              SHA1

                                                                              4bfb12aa98a1dc2206baa0ac611877b815810e4c

                                                                              SHA256

                                                                              e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                                                                              SHA512

                                                                              f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              5404286ec7853897b3ba00adf824d6c1

                                                                              SHA1

                                                                              39e543e08b34311b82f6e909e1e67e2f4afec551

                                                                              SHA256

                                                                              ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                                                                              SHA512

                                                                              c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              5eb39ba3698c99891a6b6eb036cfb653

                                                                              SHA1

                                                                              d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                                                                              SHA256

                                                                              e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                                                                              SHA512

                                                                              6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              7187cc2643affab4ca29d92251c96dee

                                                                              SHA1

                                                                              ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                                                              SHA256

                                                                              c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                                                              SHA512

                                                                              27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              b7d1e04629bec112923446fda5391731

                                                                              SHA1

                                                                              814055286f963ddaa5bf3019821cb8a565b56cb8

                                                                              SHA256

                                                                              4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                                                              SHA512

                                                                              79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              0dc4014facf82aa027904c1be1d403c1

                                                                              SHA1

                                                                              5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                                                              SHA256

                                                                              a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                                                              SHA512

                                                                              cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                                                              Filesize

                                                                              3.3MB

                                                                              MD5

                                                                              cea368fc334a9aec1ecff4b15612e5b0

                                                                              SHA1

                                                                              493d23f72731bb570d904014ffdacbba2334ce26

                                                                              SHA256

                                                                              07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                                                              SHA512

                                                                              bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                              Filesize

                                                                              3.3MB

                                                                              MD5

                                                                              045b0a3d5be6f10ddf19ae6d92dfdd70

                                                                              SHA1

                                                                              0387715b6681d7097d372cd0005b664f76c933c7

                                                                              SHA256

                                                                              94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                                              SHA512

                                                                              58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                              Filesize

                                                                              440B

                                                                              MD5

                                                                              3626532127e3066df98e34c3d56a1869

                                                                              SHA1

                                                                              5fa7102f02615afde4efd4ed091744e842c63f78

                                                                              SHA256

                                                                              2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                                              SHA512

                                                                              dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                              Filesize

                                                                              479KB

                                                                              MD5

                                                                              09372174e83dbbf696ee732fd2e875bb

                                                                              SHA1

                                                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                              SHA256

                                                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                              SHA512

                                                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                              Filesize

                                                                              13.8MB

                                                                              MD5

                                                                              0a8747a2ac9ac08ae9508f36c6d75692

                                                                              SHA1

                                                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                              SHA256

                                                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                              SHA512

                                                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                            • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              83d75087c9bf6e4f07c36e550731ccde

                                                                              SHA1

                                                                              d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                                                                              SHA256

                                                                              46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                                                                              SHA512

                                                                              044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              2cdf7d2cd457e118b81c6d6a40b39d05

                                                                              SHA1

                                                                              7b7b1c245a33ab2677924866d4c1eb214f505e32

                                                                              SHA256

                                                                              4b4f025f2257a56779a6610991af2c11a0a3f5dbb307d57b155954a6b9815a85

                                                                              SHA512

                                                                              57f389fd544656bcf74b7311156d2562fa4bfb253e8100e498e453ad70a9bd23adc2d2fa7920f6ec6970fb3b73acbb94cd04709d067556252ba0c8f3eff6070c

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                                                                              Filesize

                                                                              10KB

                                                                              MD5

                                                                              68e2e723b2c5bb138b2953d75e797bb9

                                                                              SHA1

                                                                              432ae75ecc10944086f2ee16a977c84d4731261e

                                                                              SHA256

                                                                              8155ecac22710973491370ca24817e23e6ab2d2d5e05aaee1017ff2b9a74136e

                                                                              SHA512

                                                                              61f2269bd9d30e9f5492998eb9b6ba448a0aca8e9d0a117e45a2d9ecae11fa7321404ebab9fc5f6a75d16f74db5a0a8f8384281a55813fbdccbe80bf0a69e983

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              36a1d6e23322e02fcb44b0099880c2da

                                                                              SHA1

                                                                              bcf5eba782de3917827e35d111bc2a38de4fda6b

                                                                              SHA256

                                                                              59c22cff6bebc691416cbde76c1fa0496132059c2d639a5f824f2d09f1846d02

                                                                              SHA512

                                                                              d0a2aac67000b2b3f1dedb2fab2cd493547668a16c860f417fdfb47a0fcb7af738a3393623ed4f6daaac28fa844ed7fa66f6ac088e8b55b9072dbf5f1e181bd2

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              424a9c68c6367334ea0ca0cd1b230eb3

                                                                              SHA1

                                                                              3fd12b36dd195e7f683c222bb4be54b2f6067dd4

                                                                              SHA256

                                                                              4b42a8f637b65939c7fa3fe52887c6656767e995e854e2a704ac2af0d4540708

                                                                              SHA512

                                                                              c66c05a290c9168e5a8c6f58bf0d008fd71e01d11b57ffa533f770e50ce5b207d96d686b8b8797cecefce47ef52818b577a40d659e193ffb1d16c73d41f54119

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              ff014055f5119a2f01e048354735529f

                                                                              SHA1

                                                                              ce713eca55c8bf95cdf9a48cba2a93109efde44d

                                                                              SHA256

                                                                              3758c20ea29ac40148ff238db01257ef852e2820e215030c6953e7d00f283dc1

                                                                              SHA512

                                                                              e711f8180b82ff757d91cc425fff1f6d0389df9d27c68061f0c4711dc2d52b2cb884656f79676665f74d9dd08127c7f0c982063a5209ee34d3a42e15715f9819

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              7ea58e01f7ff5ceb88a94aee8884bae7

                                                                              SHA1

                                                                              9766aa5f0f170eb8d29be704b556c59866ba2f06

                                                                              SHA256

                                                                              c531812e74b325245178de25a4ac533876e712cb5307a8e35ec0640625210687

                                                                              SHA512

                                                                              e38a202aa8aa4d7b8078f7538b1003e81b31553d16f25929d83f32c4330ced653d03f75017fb27375dd25f75c43c79d04485c229f87c9db513286970cf4cedcb

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\45bce24a-f8df-48b0-9eee-73411dae94c3

                                                                              Filesize

                                                                              982B

                                                                              MD5

                                                                              f154dcd70ced6365c24a485d234c5b52

                                                                              SHA1

                                                                              009633451c620277fe5b3f16973926f2bf56c95c

                                                                              SHA256

                                                                              673b1412401444fb1d9cbe144095ceef6ef5865e77f68d6dbccf91a6ac4c55d8

                                                                              SHA512

                                                                              09c3694fa95e388fd090cc2a247761b23a5a9499fa0b5944b6591e2a549059b727c15da54fe66ba8907a5d70b5f5e545e3b059e1dc5097a4147dfbbf7cfa2594

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\8021c71c-e6ca-45e5-af00-225f884c6810

                                                                              Filesize

                                                                              26KB

                                                                              MD5

                                                                              122aa84c68e167f3f31ca96094b18f4f

                                                                              SHA1

                                                                              43da06cc35439832d2b928359bcca768270a8166

                                                                              SHA256

                                                                              247bcd5ed3ac750dcc9992748f77a4a17fa777d245cc3f308729b4bccbf685c0

                                                                              SHA512

                                                                              bd22bd065463450e24e19084383ea49ef71ce6d29dbfff86f52db58b33989d582459607924f3a2c5211b5cd94266911e5df5ab62af7c68f9898b580eae166f2b

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\b72084a6-c6aa-4f14-b16d-0bdf56d36da2

                                                                              Filesize

                                                                              671B

                                                                              MD5

                                                                              bcdf69183572b6c993eda336c5894f0c

                                                                              SHA1

                                                                              9e8ef48e744b89fc2aa411491f442eeafaf2a1a1

                                                                              SHA256

                                                                              5aeff0624072624ae87e43a4ddc63a7ccb7dc703d29e0bfeca1eb2e8ef23a3ee

                                                                              SHA512

                                                                              8ded9efd0976ba2411dcc53e7421acb2c5d50d9280cad94eac65227a1026000a5b9e04267aba0dc1d9a338a18093d9156812f2195130246abe3a5cf79df9339f

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              842039753bf41fa5e11b3a1383061a87

                                                                              SHA1

                                                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                              SHA256

                                                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                              SHA512

                                                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                              Filesize

                                                                              116B

                                                                              MD5

                                                                              2a461e9eb87fd1955cea740a3444ee7a

                                                                              SHA1

                                                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                              SHA256

                                                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                              SHA512

                                                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                              Filesize

                                                                              372B

                                                                              MD5

                                                                              bf957ad58b55f64219ab3f793e374316

                                                                              SHA1

                                                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                              SHA256

                                                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                              SHA512

                                                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                              Filesize

                                                                              17.8MB

                                                                              MD5

                                                                              daf7ef3acccab478aaa7d6dc1c60f865

                                                                              SHA1

                                                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                              SHA256

                                                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                              SHA512

                                                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                                                                              Filesize

                                                                              12KB

                                                                              MD5

                                                                              444b8ba9a6ef788f6a9dd61780521141

                                                                              SHA1

                                                                              7529b0458240e82a865ab7ed3d51852d218a20eb

                                                                              SHA256

                                                                              80c876d1dc991d39c05b633ea5fb769be7595ec4127d2396b929a99cb78bbeed

                                                                              SHA512

                                                                              4573b403a195281b30fa038f60789128fadfa6723d041f1c2faa50b1783c0a9ee72ce5bba85387595423d36326b3be06e0216161023020264590b045cdc82b7c

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              7371320115708b53f470b4f0755a81b4

                                                                              SHA1

                                                                              512bc594a19028b541c3e88ac6c1af45bbb05c9d

                                                                              SHA256

                                                                              7e71f2312d40b37349ff463c698f064e7d44f28c33a2b6cab949e4baa5e75d7f

                                                                              SHA512

                                                                              59297367f3002eff753ef57e6156b5df2050a6b36e405d63dcd500282b4ea1155a70fc6225eb9065824a7ef0e1d9243eb83b9fde258c2c96115b968b1928542b

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              a7e26c174a7d828def82c17236b2d294

                                                                              SHA1

                                                                              6c94b8baf63a032cd478c74bd254fed20a33039e

                                                                              SHA256

                                                                              f27bbfe1a27fc71824fad3cb917a90d6844c53f9ac557776e9b65047d0f3d6cc

                                                                              SHA512

                                                                              d00170d04188821ef0de135cdb6058ceb93cc8708c44dddb1f11c383f61bfac7859418f8a9ebc264bb713d19cf85400e1d403d17b45e33798a15a454723ff691

                                                                            • C:\xmcnsf\19ba26f47ae14088b1d87179fb522895.exe

                                                                              Filesize

                                                                              1.0MB

                                                                              MD5

                                                                              971b0519b1c0461db6700610e5e9ca8e

                                                                              SHA1

                                                                              9a262218310f976aaf837e54b4842e53e73be088

                                                                              SHA256

                                                                              47cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023

                                                                              SHA512

                                                                              d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9

                                                                            • C:\xmcnsf\34665c058a8b481eaf3a6aed2017bd40.exe

                                                                              Filesize

                                                                              144KB

                                                                              MD5

                                                                              cc36e2a5a3c64941a79c31ca320e9797

                                                                              SHA1

                                                                              50c8f5db809cfec84735c9f4dcd6b55d53dfd9f5

                                                                              SHA256

                                                                              6fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8

                                                                              SHA512

                                                                              fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0

                                                                            • memory/1164-2520-0x0000000000400000-0x0000000000639000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1164-2458-0x0000000000400000-0x0000000000639000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1344-230-0x0000000003AF0000-0x0000000003D29000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1344-231-0x0000000003AF0000-0x0000000003D29000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1344-232-0x0000000003AF0000-0x0000000003D29000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1344-229-0x0000000003AF0000-0x0000000003D29000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1344-228-0x0000000003AF0000-0x0000000003D29000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1344-227-0x0000000003AF0000-0x0000000003D29000-memory.dmp

                                                                              Filesize

                                                                              2.2MB

                                                                            • memory/1472-306-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-292-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-300-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-2348-0x0000000005430000-0x0000000005496000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/1472-2346-0x0000000005180000-0x00000000051AC000-memory.dmp

                                                                              Filesize

                                                                              176KB

                                                                            • memory/1472-2347-0x0000000005230000-0x000000000527C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/1472-302-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-296-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-304-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-286-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-262-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-308-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-264-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-266-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-268-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-272-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-274-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-276-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-310-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-278-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-280-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-282-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-312-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-294-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-270-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-261-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-260-0x0000000002CC0000-0x0000000002D58000-memory.dmp

                                                                              Filesize

                                                                              608KB

                                                                            • memory/1472-298-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-256-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/1472-290-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-284-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1472-288-0x0000000002CC0000-0x0000000002D51000-memory.dmp

                                                                              Filesize

                                                                              580KB

                                                                            • memory/1692-2905-0x0000000000530000-0x0000000000A13000-memory.dmp

                                                                              Filesize

                                                                              4.9MB

                                                                            • memory/1692-3821-0x0000000000530000-0x0000000000A13000-memory.dmp

                                                                              Filesize

                                                                              4.9MB

                                                                            • memory/1692-2629-0x0000000000530000-0x0000000000A13000-memory.dmp

                                                                              Filesize

                                                                              4.9MB

                                                                            • memory/1724-3317-0x00000000002E0000-0x000000000077A000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/1724-3262-0x00000000002E0000-0x000000000077A000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/1796-193-0x00007FF60D420000-0x00007FF60D8B0000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/1796-195-0x00007FF60D420000-0x00007FF60D8B0000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/2132-2410-0x0000000000B20000-0x0000000001791000-memory.dmp

                                                                              Filesize

                                                                              12.4MB

                                                                            • memory/2132-2403-0x0000000000B20000-0x0000000001791000-memory.dmp

                                                                              Filesize

                                                                              12.4MB

                                                                            • memory/2316-2696-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                                              Filesize

                                                                              8.4MB

                                                                            • memory/2316-3691-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                                              Filesize

                                                                              8.4MB

                                                                            • memory/2316-2460-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                                              Filesize

                                                                              8.4MB

                                                                            • memory/3284-2345-0x0000000000460000-0x000000000046C000-memory.dmp

                                                                              Filesize

                                                                              48KB

                                                                            • memory/3388-2439-0x0000000000D80000-0x0000000001A1E000-memory.dmp

                                                                              Filesize

                                                                              12.6MB

                                                                            • memory/3388-2371-0x0000000000D80000-0x0000000001A1E000-memory.dmp

                                                                              Filesize

                                                                              12.6MB

                                                                            • memory/3388-224-0x0000000000D80000-0x0000000001A1E000-memory.dmp

                                                                              Filesize

                                                                              12.6MB

                                                                            • memory/4236-124-0x000000007347E000-0x000000007347F000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4236-39-0x000000007347E000-0x000000007347F000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4236-45-0x00000000080B0000-0x00000000080D6000-memory.dmp

                                                                              Filesize

                                                                              152KB

                                                                            • memory/4236-44-0x0000000008010000-0x00000000080AC000-memory.dmp

                                                                              Filesize

                                                                              624KB

                                                                            • memory/4236-43-0x00000000053B0000-0x00000000053BA000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/4236-42-0x0000000007D90000-0x0000000007E22000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/4236-208-0x0000000006970000-0x0000000006A32000-memory.dmp

                                                                              Filesize

                                                                              776KB

                                                                            • memory/4236-41-0x00000000082A0000-0x0000000008844000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/4236-40-0x0000000000F00000-0x0000000001016000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/4552-207-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4552-46-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4552-80-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4552-18-0x0000000000EE1000-0x0000000000F0F000-memory.dmp

                                                                              Filesize

                                                                              184KB

                                                                            • memory/4552-19-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4552-81-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4552-17-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4552-20-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4680-4-0x00000000008A0000-0x0000000000BD1000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4680-3-0x00000000008A0000-0x0000000000BD1000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4680-2-0x00000000008A1000-0x00000000008CF000-memory.dmp

                                                                              Filesize

                                                                              184KB

                                                                            • memory/4680-1-0x0000000077864000-0x0000000077866000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/4680-15-0x00000000008A0000-0x0000000000BD1000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4680-0-0x00000000008A0000-0x0000000000BD1000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/4916-206-0x00000203F7DB0000-0x00000203F7DD2000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/5064-2422-0x00000000067B0000-0x00000000067FC000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/5064-2423-0x000000006FFD0000-0x000000007001C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/5064-2433-0x0000000007990000-0x0000000007A33000-memory.dmp

                                                                              Filesize

                                                                              652KB

                                                                            • memory/5064-2434-0x0000000007C20000-0x0000000007C31000-memory.dmp

                                                                              Filesize

                                                                              68KB

                                                                            • memory/5064-2435-0x0000000007C60000-0x0000000007C74000-memory.dmp

                                                                              Filesize

                                                                              80KB

                                                                            • memory/5248-7004-0x00007FF7D0470000-0x00007FF7D0900000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/5264-2508-0x0000000000CF0000-0x0000000001184000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/5264-2597-0x0000000000CF0000-0x0000000001184000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/5576-6995-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/5612-2472-0x00000226F4D60000-0x00000226F4E1A000-memory.dmp

                                                                              Filesize

                                                                              744KB

                                                                            • memory/5612-2487-0x00000226F4660000-0x00000226F4672000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/5612-2488-0x00000226F46C0000-0x00000226F46FC000-memory.dmp

                                                                              Filesize

                                                                              240KB

                                                                            • memory/5612-2509-0x00000226F85D0000-0x00000226F85F6000-memory.dmp

                                                                              Filesize

                                                                              152KB

                                                                            • memory/5612-2490-0x00000226F72B0000-0x00000226F72B8000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/5612-2471-0x00000226F34A0000-0x00000226F34AA000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/5612-2492-0x00000226F7310000-0x00000226F731E000-memory.dmp

                                                                              Filesize

                                                                              56KB

                                                                            • memory/5612-2491-0x00000226F7340000-0x00000226F7378000-memory.dmp

                                                                              Filesize

                                                                              224KB

                                                                            • memory/5612-2493-0x00000226F83F0000-0x00000226F8576000-memory.dmp

                                                                              Filesize

                                                                              1.5MB

                                                                            • memory/5612-2470-0x00000226D8F40000-0x00000226D9042000-memory.dmp

                                                                              Filesize

                                                                              1.0MB

                                                                            • memory/5620-2369-0x00000000069B0000-0x00000000069FC000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/5620-2373-0x000000006F3F0000-0x000000006F43C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/5620-2350-0x00000000053B0000-0x00000000053E6000-memory.dmp

                                                                              Filesize

                                                                              216KB

                                                                            • memory/5620-2351-0x0000000005B30000-0x0000000006158000-memory.dmp

                                                                              Filesize

                                                                              6.2MB

                                                                            • memory/5620-2352-0x0000000006240000-0x0000000006262000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/5620-2358-0x00000000062E0000-0x0000000006346000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/5620-2367-0x00000000064C0000-0x0000000006814000-memory.dmp

                                                                              Filesize

                                                                              3.3MB

                                                                            • memory/5620-2368-0x0000000006980000-0x000000000699E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/5620-2372-0x0000000006F60000-0x0000000006F92000-memory.dmp

                                                                              Filesize

                                                                              200KB

                                                                            • memory/5620-2408-0x0000000007FD0000-0x0000000007FD8000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/5620-2407-0x0000000007FF0000-0x000000000800A000-memory.dmp

                                                                              Filesize

                                                                              104KB

                                                                            • memory/5620-2405-0x0000000007EF0000-0x0000000007F04000-memory.dmp

                                                                              Filesize

                                                                              80KB

                                                                            • memory/5620-2404-0x0000000007EE0000-0x0000000007EEE000-memory.dmp

                                                                              Filesize

                                                                              56KB

                                                                            • memory/5620-2389-0x0000000007EB0000-0x0000000007EC1000-memory.dmp

                                                                              Filesize

                                                                              68KB

                                                                            • memory/5620-2388-0x0000000007F30000-0x0000000007FC6000-memory.dmp

                                                                              Filesize

                                                                              600KB

                                                                            • memory/5620-2387-0x0000000007D30000-0x0000000007D3A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/5620-2386-0x0000000007CB0000-0x0000000007CCA000-memory.dmp

                                                                              Filesize

                                                                              104KB

                                                                            • memory/5620-2383-0x0000000006FA0000-0x0000000006FBE000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/5620-2385-0x0000000008300000-0x000000000897A000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/5620-2384-0x0000000007980000-0x0000000007A23000-memory.dmp

                                                                              Filesize

                                                                              652KB

                                                                            • memory/6244-2848-0x0000000000EE0000-0x0000000001211000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/6444-2849-0x00007FF7D0470000-0x00007FF7D0900000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/6444-2864-0x00007FF7D0470000-0x00007FF7D0900000-memory.dmp

                                                                              Filesize

                                                                              4.6MB

                                                                            • memory/6516-3817-0x0000000000200000-0x0000000000531000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/6516-3781-0x0000000000200000-0x0000000000531000-memory.dmp

                                                                              Filesize

                                                                              3.2MB

                                                                            • memory/7136-3335-0x00000000002D0000-0x0000000000594000-memory.dmp

                                                                              Filesize

                                                                              2.8MB

                                                                            • memory/7136-2891-0x00000000002D0000-0x0000000000594000-memory.dmp

                                                                              Filesize

                                                                              2.8MB

                                                                            • memory/7136-2898-0x00000000002D0000-0x0000000000594000-memory.dmp

                                                                              Filesize

                                                                              2.8MB

                                                                            • memory/7136-2899-0x00000000002D0000-0x0000000000594000-memory.dmp

                                                                              Filesize

                                                                              2.8MB

                                                                            • memory/7136-3332-0x00000000002D0000-0x0000000000594000-memory.dmp

                                                                              Filesize

                                                                              2.8MB