Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 03:18

General

  • Target

    caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe

  • Size

    6.7MB

  • MD5

    52a690e9dfd4381279322db1fc65a8e1

  • SHA1

    e91878f0be877337b05421b17034afd527298d8e

  • SHA256

    caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b

  • SHA512

    92d2c6e4c82fbb8d458c529a93a5a16a3f10f514415f61d8da2ff1d641c5c622ae1c6318789e73f04d0a89614324b82740e665d30f9e4ce2cae4d57c4551097a

  • SSDEEP

    196608:D7Gv1sGOIgntxbB3+CiExG0ZtYpnmODqS3skwi:D7Gvi1IgntxbBF3xZZtYpnfDqS8

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

cryptbot

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
  • XMRig Miner payload 4 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 38 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe
    "C:\Users\Admin\AppData\Local\Temp\caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q5b36.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q5b36.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7w13.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7w13.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i64X1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i64X1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4596
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Users\Admin\AppData\Local\Temp\1019858001\366b75805a.exe
              "C:\Users\Admin\AppData\Local\Temp\1019858001\366b75805a.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2444
            • C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe
              "C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1164
              • C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe
                "C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2856
            • C:\Users\Admin\AppData\Local\Temp\1019860001\f41cd7e0c2.exe
              "C:\Users\Admin\AppData\Local\Temp\1019860001\f41cd7e0c2.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5916
            • C:\Users\Admin\AppData\Local\Temp\1019861001\e2a854e61a.exe
              "C:\Users\Admin\AppData\Local\Temp\1019861001\e2a854e61a.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5752
            • C:\Users\Admin\AppData\Local\Temp\1019862001\753788c96e.exe
              "C:\Users\Admin\AppData\Local\Temp\1019862001\753788c96e.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:6080
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5124
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4040
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4780
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2176
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1688
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:4624
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:2368
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {332c5d21-db44-4cbd-80d1-3720e74a9e83} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" gpu
                      9⤵
                        PID:5972
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e1cf023-7a29-4ff7-a8ec-5e12f433c880} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" socket
                        9⤵
                          PID:6048
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3148 -childID 1 -isForBrowser -prefsHandle 3160 -prefMapHandle 3156 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1413e921-4493-4370-8446-9fb2c88d373c} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab
                          9⤵
                            PID:5396
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 3140 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b32b363c-8461-4c9a-b2fa-1baf23bb406c} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab
                            9⤵
                              PID:3572
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4564 -prefMapHandle 4556 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5f8af20-62a1-49a0-a677-552d840fe481} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" utility
                              9⤵
                              • Checks processor information in registry
                              PID:6816
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6d8dd31-9f50-4f67-a90f-10a81c21e729} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab
                              9⤵
                                PID:4764
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5320 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf81321e-d0d4-4d44-bb32-ee05b6b57560} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab
                                9⤵
                                  PID:2884
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 5 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e0da759-5bbe-4590-9ed8-46c384ee16a6} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab
                                  9⤵
                                    PID:1400
                            • C:\Users\Admin\AppData\Local\Temp\1019863001\63df04fc4a.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019863001\63df04fc4a.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3064
                            • C:\Users\Admin\AppData\Local\Temp\1019864001\351a102769.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019864001\351a102769.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2004
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 892
                                7⤵
                                • Program crash
                                PID:6304
                            • C:\Users\Admin\AppData\Local\Temp\1019865001\a59a20cc1c.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019865001\a59a20cc1c.exe"
                              6⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:6732
                              • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3060
                            • C:\Users\Admin\AppData\Local\Temp\1019866001\8b62393c36.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019866001\8b62393c36.exe"
                              6⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Drops file in Program Files directory
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5472
                              • C:\Program Files\Windows Media Player\graph\graph.exe
                                "C:\Program Files\Windows Media Player\graph\graph.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4308
                            • C:\Users\Admin\AppData\Local\Temp\1019867001\e780f3bb50.exe
                              "C:\Users\Admin\AppData\Local\Temp\1019867001\e780f3bb50.exe"
                              6⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4620
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                7⤵
                                  PID:384
                                  • C:\Windows\system32\mode.com
                                    mode 65,10
                                    8⤵
                                      PID:5996
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5084
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_7.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6096
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_6.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1536
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_5.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2184
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_4.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6536
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_3.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6584
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_2.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5800
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_1.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6656
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H "in.exe"
                                      8⤵
                                      • Views/modifies file attributes
                                      PID:6884
                                    • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                      "in.exe"
                                      8⤵
                                      • Executes dropped EXE
                                      PID:6840
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:6732
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:3772
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                        9⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2560
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell ping 127.0.0.1; del in.exe
                                        9⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4236
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          10⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:2908
                                • C:\Users\Admin\AppData\Local\Temp\1019868001\b056717b24.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019868001\b056717b24.exe"
                                  6⤵
                                  • Enumerates VirtualBox registry keys
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:6380
                                • C:\Users\Admin\AppData\Local\Temp\1019869001\7a4ca5d972.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019869001\7a4ca5d972.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:6700
                                • C:\Users\Admin\AppData\Local\Temp\1019870001\1c5796d759.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019870001\1c5796d759.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:5488
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 780
                                    7⤵
                                    • Program crash
                                    PID:6600
                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2I9802.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2I9802.exe
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2064
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w99q.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w99q.exe
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:1608
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                              4⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of WriteProcessMemory
                              PID:4544
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd0c56cc40,0x7ffd0c56cc4c,0x7ffd0c56cc58
                                5⤵
                                  PID:3128
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:2
                                  5⤵
                                    PID:2004
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2088,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:3
                                    5⤵
                                      PID:2464
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:8
                                      5⤵
                                        PID:960
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:2132
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:2860
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:3724
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:8
                                        5⤵
                                          PID:2684
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:8
                                          5⤵
                                            PID:3648
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4904,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4956 /prefetch:8
                                            5⤵
                                              PID:540
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5232,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:8
                                              5⤵
                                                PID:3832
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5176,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4244 /prefetch:8
                                                5⤵
                                                  PID:2340
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5476,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5480 /prefetch:8
                                                  5⤵
                                                    PID:976
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5444,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5396 /prefetch:2
                                                    5⤵
                                                    • Uses browser remote debugging
                                                    PID:5404
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                  4⤵
                                                  • Uses browser remote debugging
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:680
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffd0c5746f8,0x7ffd0c574708,0x7ffd0c574718
                                                    5⤵
                                                    • Checks processor information in registry
                                                    • Enumerates system info in registry
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1416
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:2
                                                    5⤵
                                                      PID:2240
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
                                                      5⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4108
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
                                                      5⤵
                                                        PID:380
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:3000
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:5164
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:2
                                                        5⤵
                                                          PID:5176
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:2
                                                          5⤵
                                                            PID:5252
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2676 /prefetch:2
                                                            5⤵
                                                              PID:5316
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2748 /prefetch:2
                                                              5⤵
                                                                PID:5428
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2708 /prefetch:2
                                                                5⤵
                                                                  PID:5440
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4048 /prefetch:2
                                                                  5⤵
                                                                    PID:5468
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3968 /prefetch:2
                                                                    5⤵
                                                                      PID:5508
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4212 /prefetch:2
                                                                      5⤵
                                                                        PID:5524
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\HIDBFCBGDB.exe"
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:6684
                                                                      • C:\Users\Admin\Documents\HIDBFCBGDB.exe
                                                                        "C:\Users\Admin\Documents\HIDBFCBGDB.exe"
                                                                        5⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:6724
                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C357N.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C357N.exe
                                                                  2⤵
                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Windows security modification
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:6908
                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                1⤵
                                                                  PID:3700
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                  1⤵
                                                                    PID:3656
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2004 -ip 2004
                                                                    1⤵
                                                                      PID:2208
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2004 -ip 2004
                                                                      1⤵
                                                                        PID:4088
                                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                        1⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:6896
                                                                      • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1264
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5488 -ip 5488
                                                                        1⤵
                                                                          PID:5712
                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                          1⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          PID:6724
                                                                        • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:6528
                                                                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          PID:6712
                                                                          • C:\Windows\explorer.exe
                                                                            explorer.exe
                                                                            2⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2924
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                            2⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:5056
                                                                            • C:\Windows\system32\PING.EXE
                                                                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                              3⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:4600

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files\Windows Media Player\graph\graph.exe

                                                                          Filesize

                                                                          245KB

                                                                          MD5

                                                                          7d254439af7b1caaa765420bea7fbd3f

                                                                          SHA1

                                                                          7bd1d979de4a86cb0d8c2ad9e1945bd351339ad0

                                                                          SHA256

                                                                          d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394

                                                                          SHA512

                                                                          c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc

                                                                        • C:\ProgramData\FCFBGIDAEHCFIDGCBGII

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          0e4ef5f68636eda43cf3146a46128094

                                                                          SHA1

                                                                          118872f90f7dea7946bf44cbe6a82be6eb5e3fdb

                                                                          SHA256

                                                                          6de175e68c9739d1b03af2a4d9e8f544c23a04dc52aecc87f016154d1fb6877d

                                                                          SHA512

                                                                          9e5492486f57cd60d28efafc6d920d74c2db7cafd833afaee969796736af746ca57216d9654ceddfe1bdaf6a0110bf35d2b736e993f5049fa5fa596d5e02f021

                                                                        • C:\ProgramData\mozglue.dll

                                                                          Filesize

                                                                          593KB

                                                                          MD5

                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                          SHA1

                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                          SHA256

                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                          SHA512

                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                        • C:\ProgramData\nss3.dll

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                          SHA1

                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                          SHA256

                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                          SHA512

                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                          Filesize

                                                                          649B

                                                                          MD5

                                                                          813b7c52a41026f90ba8be757d054837

                                                                          SHA1

                                                                          a6b2f54b5b5891ea90cb560399c70743b62fa1e1

                                                                          SHA256

                                                                          8d90ef0e092ebb3fe483f9276b10bbf7d770cbe78ec36d2a32541714557573c1

                                                                          SHA512

                                                                          66470413c7443978808f98d28625e26e3693dd04f2b03120395d056bf8dbaace03fb791caa3a3109f6241d4f1ba4f73600c1b9abfaba8b82733281366ce12e7a

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                                          Filesize

                                                                          851B

                                                                          MD5

                                                                          07ffbe5f24ca348723ff8c6c488abfb8

                                                                          SHA1

                                                                          6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                          SHA256

                                                                          6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                          SHA512

                                                                          7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                                          Filesize

                                                                          854B

                                                                          MD5

                                                                          4ec1df2da46182103d2ffc3b92d20ca5

                                                                          SHA1

                                                                          fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                          SHA256

                                                                          6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                          SHA512

                                                                          939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                          Filesize

                                                                          2B

                                                                          MD5

                                                                          d751713988987e9331980363e24189ce

                                                                          SHA1

                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                          SHA256

                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                          SHA512

                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                          Filesize

                                                                          150B

                                                                          MD5

                                                                          fff6969582b1a7505a3bbfd932383c7c

                                                                          SHA1

                                                                          e5d7bdc24a4728b46e358134efd8ac14783f5e14

                                                                          SHA256

                                                                          a269aa2d5f88a532ccf1749fe26d9579e8e29494c789293b0b54d5f8dc3bec45

                                                                          SHA512

                                                                          cbea187f140fe35b77070afb5cca7cd8898d0a6f4c1af3b16f10e550dfb0d8ac42327aca08d8bf7026032b334157f26632eb2003324d8f2493003ef20b6f4da5

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ee112085-413a-4689-9e0b-14e97af161b7.dmp

                                                                          Filesize

                                                                          10.4MB

                                                                          MD5

                                                                          19af92f4508f7c5e584282e89f822b3a

                                                                          SHA1

                                                                          cd003a489560f53c30b885bb16aed2eb2ff13349

                                                                          SHA256

                                                                          3b0710a74463c77b53fa3888d9010ff846856c69bf8583532c73a585df758ea0

                                                                          SHA512

                                                                          d7ff885ca0135bf7b7cf8e3a2feb268d3399ad68970f4a40842f1ac9dd36d8dc3a4366c8d1451a1d9d67d18e8bba45b7f2b01a4d289cf6be05f773882e3ac811

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          a0486d6f8406d852dd805b66ff467692

                                                                          SHA1

                                                                          77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                                          SHA256

                                                                          c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                                          SHA512

                                                                          065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          dc058ebc0f8181946a312f0be99ed79c

                                                                          SHA1

                                                                          0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                                          SHA256

                                                                          378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                                          SHA512

                                                                          36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          7dc3df72cdc2786bdf7f32897e60e74c

                                                                          SHA1

                                                                          46af88cd47bf59e1db5870aab59cdd6cc2dd6d97

                                                                          SHA256

                                                                          d2f4fa00c70eae25e8372f6d85995ff0100d4ece53810b4db085341a2ddb9c58

                                                                          SHA512

                                                                          eafc1d79a77d365757373643d131b29750e97f8cfe5b512fd7cf754200e7bfe1e590b520ac11b9de359997bf0854fc3a27d0d614b270c26f93c33e86993a441f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a430ef45-b4f7-4947-a333-a67c74cfdbc0.tmp

                                                                          Filesize

                                                                          1B

                                                                          MD5

                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                          SHA1

                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                          SHA256

                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                          SHA512

                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                          Filesize

                                                                          264KB

                                                                          MD5

                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                          SHA1

                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                          SHA256

                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                          SHA512

                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZA7RG4JF\download[1].htm

                                                                          Filesize

                                                                          1B

                                                                          MD5

                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                          SHA1

                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                          SHA256

                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                          SHA512

                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                                                                          Filesize

                                                                          23KB

                                                                          MD5

                                                                          5906a5d2a0f25456bc44014da61af4d4

                                                                          SHA1

                                                                          08604eaaab44a9954610d50685410dc6d35537d0

                                                                          SHA256

                                                                          5e8ef575aa34e2db154283dfffc652991e389f59d18b153ae550555aee132e6f

                                                                          SHA512

                                                                          36681530bb7c9f57e1a179f415e9daeac920885de14212673fc2794ca066b8c434cd288b17b141b4d481c95c5db9d92fa875b7dc023835cc20018b810453ca9e

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31

                                                                          Filesize

                                                                          13KB

                                                                          MD5

                                                                          c14c6e67485591043f02abb00d18886f

                                                                          SHA1

                                                                          e24563a94ebe9bdd57e107db41de94d7d2488ed8

                                                                          SHA256

                                                                          3ce145e717f10bef571f3cec2eb58c60a5a0440ea52bd6dcbddfb0561d193cb0

                                                                          SHA512

                                                                          8ef8d9277cc6cb06ac78b35f8ecc213afeeac15fd2dfbbe395831ac4adeb643dd73f6d74f0c9c685d700e3b8a290c61073be9ac7d10feb2dd9592959c057df59

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                          Filesize

                                                                          13KB

                                                                          MD5

                                                                          aed7eb427c1b2d26cb1cb18625bce3be

                                                                          SHA1

                                                                          b83bec279a9c4c7cc8c96ab5688e448384cb73ad

                                                                          SHA256

                                                                          43aa9b88f472e335eadb14f67d25462917083fce0f57a603c7fb3b1abcb28052

                                                                          SHA512

                                                                          d0e96f149e02e6a841f848b9e9cbe23c9f27e73c7d2f309c5eb193f747fbaf04ad83003bd005b952edb84f466cb979ababa623c5b38cdc91d42ea6115529332c

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                                                                          Filesize

                                                                          9KB

                                                                          MD5

                                                                          ce91cd142b8b587ee83014208782b1d9

                                                                          SHA1

                                                                          67a74a5df228275beeffb2fcf19c144010d04b3e

                                                                          SHA256

                                                                          48ad13ee68395fd5a53aba2c613d4c84c5be487f99054e0b7cc6042ddb53103b

                                                                          SHA512

                                                                          ae9bd42a97072f7735ef20459344bbf0cb3314d722593b8e45073e13254d49a7743b71ff5858af5b2c06b4526aa1dc73647ecea0b30415a3e931d5cf8599b82a

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                          Filesize

                                                                          15KB

                                                                          MD5

                                                                          96c542dec016d9ec1ecc4dddfcbaac66

                                                                          SHA1

                                                                          6199f7648bb744efa58acf7b96fee85d938389e4

                                                                          SHA256

                                                                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                          SHA512

                                                                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019858001\366b75805a.exe

                                                                          Filesize

                                                                          2.5MB

                                                                          MD5

                                                                          87330f1877c33a5a6203c49075223b16

                                                                          SHA1

                                                                          55b64ee8b2d1302581ab1978e9588191e4e62f81

                                                                          SHA256

                                                                          98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                                                          SHA512

                                                                          7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe

                                                                          Filesize

                                                                          758KB

                                                                          MD5

                                                                          afd936e441bf5cbdb858e96833cc6ed3

                                                                          SHA1

                                                                          3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                                          SHA256

                                                                          c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                                          SHA512

                                                                          928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019860001\f41cd7e0c2.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          f9f07e06bf4187709de621a0cbae5b6c

                                                                          SHA1

                                                                          2a728d28f69d07e3aad391758e01ff88bc69a62a

                                                                          SHA256

                                                                          fcc75ebbf13031db63db04ec67665f6fb3247e92c58268d60e40b1de45a484dc

                                                                          SHA512

                                                                          c12e72b833b84bcd8292d2a9e75ebc0cca5411d604744b52ac8a26aa863be4f3035efd0a8279631c998e1ab554adf6e3e6b92552103e6fc9b4269d4d407f3dd7

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019861001\e2a854e61a.exe

                                                                          Filesize

                                                                          2.8MB

                                                                          MD5

                                                                          8ea0abac189af983f6146d5d449ba1b3

                                                                          SHA1

                                                                          f7329dbea54fa4f0827b7957e1893f6fc66fd88a

                                                                          SHA256

                                                                          afe849d1b68d20fd3497eb2591ef7a44f94909abd8e912d683dd618c584981ec

                                                                          SHA512

                                                                          34539dbf55446b1c15fbbe57e7cec1d573d955a7a95391ace83670a2886b479123a8a659a1e64779aa223d761d0a7c0ee001a01a9f27dd38a7486bb66fdb41df

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019862001\753788c96e.exe

                                                                          Filesize

                                                                          942KB

                                                                          MD5

                                                                          daa8d515648afb5c90988946b5281157

                                                                          SHA1

                                                                          f63b38ba6869ec18dd9906967e195030e7b72b13

                                                                          SHA256

                                                                          79e712459f65d39971e842a08b72d56f642203930cd6d5c866e42afbe266e096

                                                                          SHA512

                                                                          aa9b85e5e116116a1ac1284c35a62ad4236a1eb223645d106212f1c5bc9fc779af0250b87684ba42dc70b0ec1aea3e29703eb93d63cc1bc601389459e6f642b3

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019863001\63df04fc4a.exe

                                                                          Filesize

                                                                          2.7MB

                                                                          MD5

                                                                          ba91936401701b66241f22bcff1e57f8

                                                                          SHA1

                                                                          730b7231ab593a4fc9c8b194a04f3daff64ec85e

                                                                          SHA256

                                                                          94799ac4701cbf18dcf7ac3fcf7486a141015ed95f64019d7b2493c6eee12f02

                                                                          SHA512

                                                                          2246e9f4d51246c969ac220b85f617685b37409c28cac68e65915dca2568276bc89308be762718de52afe11ebb5b8e68f7a01924be2cf15e391f6a90858958d5

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019864001\351a102769.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          15709eba2afaf7cc0a86ce0abf8e53f1

                                                                          SHA1

                                                                          238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                                                                          SHA256

                                                                          10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                                                                          SHA512

                                                                          65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019865001\a59a20cc1c.exe

                                                                          Filesize

                                                                          429KB

                                                                          MD5

                                                                          51ff79b406cb223dd49dd4c947ec97b0

                                                                          SHA1

                                                                          b9b0253480a1b6cbdd673383320fecae5efb3dce

                                                                          SHA256

                                                                          2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                                                                          SHA512

                                                                          c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019866001\8b62393c36.exe

                                                                          Filesize

                                                                          591KB

                                                                          MD5

                                                                          3567cb15156760b2f111512ffdbc1451

                                                                          SHA1

                                                                          2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                                                          SHA256

                                                                          0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                                                          SHA512

                                                                          e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019867001\e780f3bb50.exe

                                                                          Filesize

                                                                          4.2MB

                                                                          MD5

                                                                          3a425626cbd40345f5b8dddd6b2b9efa

                                                                          SHA1

                                                                          7b50e108e293e54c15dce816552356f424eea97a

                                                                          SHA256

                                                                          ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                          SHA512

                                                                          a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019868001\b056717b24.exe

                                                                          Filesize

                                                                          4.3MB

                                                                          MD5

                                                                          29e26186e733127fe58a92d8fa5710af

                                                                          SHA1

                                                                          5a898e03714aabec25ea798d04d75772f7180951

                                                                          SHA256

                                                                          5953c30c6e6687316eecad90085082496519f158efee2c29153e90c8b7e61aae

                                                                          SHA512

                                                                          eba0ea5996d19b22b015112c4d620e5042c415a6e82bb32014d13eabb04b72aabbc99111e4dc6403c601a677c7c25abb01078ead945e702b9fc31210fbacf1d2

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019869001\7a4ca5d972.exe

                                                                          Filesize

                                                                          4.3MB

                                                                          MD5

                                                                          416736895f3b6021b4ebe4173c814106

                                                                          SHA1

                                                                          7e2e1ac6dfcac96522dd5610290119d778086dbb

                                                                          SHA256

                                                                          135caea7497cca4a151d49412a1594be435ae2af9827221d8ef67a66ed75a9f4

                                                                          SHA512

                                                                          d6989c5553265c58ac5b928ab3f2035a8b55bc2c94f52a135380bfb3ef132601970a52c3afcec9dd15d385a9b0c7fc12a5612870a5e6c9050f1cfde1335f5bf5

                                                                        • C:\Users\Admin\AppData\Local\Temp\1019870001\1c5796d759.exe

                                                                          Filesize

                                                                          1.9MB

                                                                          MD5

                                                                          487e3b0675d3f03948a804f57bb2db85

                                                                          SHA1

                                                                          bdc7d056c9258128bb275393d96d72a09b938e0c

                                                                          SHA256

                                                                          aceb23e8155c967806683f0c64a59328a05f135a33593abeafbe3f4fb9e98b97

                                                                          SHA512

                                                                          2d02d540f7270a3ecb78f7690aca923d9ca1075218bcc324ab2e6f1a00a94e0325c7f24b371cc0adfe9426dada16ad1ed9d539fffd0fa6bad13a58f23bb3f8ee

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C357N.exe

                                                                          Filesize

                                                                          2.7MB

                                                                          MD5

                                                                          924b9cde47b9957ede7465edd607fc47

                                                                          SHA1

                                                                          d6c1932bcfd2b1ba320bfbf56f133ed7d87cde04

                                                                          SHA256

                                                                          535eecafd723fff74e56d999de527eae4e9a91792f4b8b85228e8eff038e893e

                                                                          SHA512

                                                                          0605a1bc3140143868a54455b4efbdf9f31644bf18c278dd2b91f9328e308d0c82f7d5834637fd64d8ece261804d12959f7118dac60d350bc0db7de1f912a14d

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q5b36.exe

                                                                          Filesize

                                                                          5.2MB

                                                                          MD5

                                                                          00727670295907dd6cf768df10a50b76

                                                                          SHA1

                                                                          cc294470a7f27bce84c2f897728ed82acd3ad91f

                                                                          SHA256

                                                                          60f33c359006cd3995332acc37fc906f9c7550c72dfa4ce8ebaaeb6428ceb490

                                                                          SHA512

                                                                          34546089a54c74bb387579d09035e37691fd47e8f61f7c2eafc8ff8a89dac925bbeaa6063742694d1ee57b55f9019569e23c32f4b2326ba4ed4609407633cdae

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w99q.exe

                                                                          Filesize

                                                                          2.8MB

                                                                          MD5

                                                                          e48ca69b3f439cf66679ffe60efd564f

                                                                          SHA1

                                                                          fb466d0297ee39819d14dffb99c69bab52dcef4b

                                                                          SHA256

                                                                          c9b2322743d3daf2d975110637d09f00bf2481eae2a447f718cf53696eac35c4

                                                                          SHA512

                                                                          529b1693ab4415484b20a9fa0bd6a7d7ca017da3341abebf900be63425fa77d9d2296b7506059696e383307d24ec4ecb7f6e3936551248642cc7ff71d0aca194

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7w13.exe

                                                                          Filesize

                                                                          3.6MB

                                                                          MD5

                                                                          19d84f8395d57732607159bb53935610

                                                                          SHA1

                                                                          8d51768b3b3563e95dd82c07e582ff0cb469ebb7

                                                                          SHA256

                                                                          082e10ec71391e90e0246b0499e90aff78d8c8beac9b1a4703327ccff919b8a8

                                                                          SHA512

                                                                          da6c0f948c077bda48e97845c21015a3305bd66e0285d9b8f7735abccd0d68b9fc09e37b0c9a1cc934b90a96d2794dedeaec6f946ad0da40d81462c969463d96

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i64X1.exe

                                                                          Filesize

                                                                          2.9MB

                                                                          MD5

                                                                          9d38889192a887e1128ec41dd417fb6d

                                                                          SHA1

                                                                          bf6b8a7c9ea4519ee2b4233375b9cf2cc9c7840b

                                                                          SHA256

                                                                          b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963

                                                                          SHA512

                                                                          d4e8aee2c1318e34537d0803f137282b5e9ec58b9a8113e38e8576f0808066f5a690149ea97f720d02642645e85edeba5c1dc482e6d730da25cb99caf604c8e3

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2I9802.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          0cc471c7099d858cc1e17ea0cbb7667a

                                                                          SHA1

                                                                          e59170940dd734f2db4b5d10b7df5951aa37d829

                                                                          SHA256

                                                                          67c8aaa4be23aff386d5a5ed1438f1d980db74096d9a1295a55d84f59dfb9377

                                                                          SHA512

                                                                          cea701bed25944f2e82aa33a50a28001de9e92f59b7aa1af4b2615d0b008e71f16c8cced5cd9986108563cc2a984f67b3f52a8533be7a0292a289edc3a53b837

                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_run4vq4a.uw3.ps1

                                                                          Filesize

                                                                          60B

                                                                          MD5

                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                          SHA1

                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                          SHA256

                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                          SHA512

                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir4544_574769562\045e272d-f185-45d1-92d1-91bb26f7667a.tmp

                                                                          Filesize

                                                                          150KB

                                                                          MD5

                                                                          14937b985303ecce4196154a24fc369a

                                                                          SHA1

                                                                          ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                                                          SHA256

                                                                          71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                                                          SHA512

                                                                          1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir4544_574769562\CRX_INSTALL\_locales\en\messages.json

                                                                          Filesize

                                                                          711B

                                                                          MD5

                                                                          558659936250e03cc14b60ebf648aa09

                                                                          SHA1

                                                                          32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                          SHA256

                                                                          2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                          SHA512

                                                                          1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                          Filesize

                                                                          479KB

                                                                          MD5

                                                                          09372174e83dbbf696ee732fd2e875bb

                                                                          SHA1

                                                                          ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                          SHA256

                                                                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                          SHA512

                                                                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                          Filesize

                                                                          13.8MB

                                                                          MD5

                                                                          0a8747a2ac9ac08ae9508f36c6d75692

                                                                          SHA1

                                                                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                          SHA256

                                                                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                          SHA512

                                                                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          d71f7cfdf7850bbbb3d55b02d20d021c

                                                                          SHA1

                                                                          4eb3f10543d2904ec8f46a4529f0745b586244b9

                                                                          SHA256

                                                                          01431af8c693b730a248d5f4aae12a0cc01e8846733835c71b680e8cea80511e

                                                                          SHA512

                                                                          efbf8e9ecda4ad8e4c13b2b6b792510e98df4b1c9ddcf612fe7ec85096e5398fff4ec5370756ac12add46df6e82ef51ac812bb3a184ca2135672b8843ea0c012

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          7c2538d077ec9b349d13a2dcee0352fd

                                                                          SHA1

                                                                          2ffddba3686197e15062659f82a4107a70980195

                                                                          SHA256

                                                                          f8ef6c9d9d378c0618f3d74cf5b427de3b86bc5c0c5a9171067d7ce77c1cfece

                                                                          SHA512

                                                                          1afb2f64ff49585a5e66e4764c634297311139a5debd35a297e0ef6266bd0e2f12adc28001fe53bed3eec363dddb2908255b21c220b9899dadf3f680fd55f368

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cookies.sqlite-wal

                                                                          Filesize

                                                                          256KB

                                                                          MD5

                                                                          ee3b774da7aa719591b9f9eeb8e63398

                                                                          SHA1

                                                                          b38504319d8b632b74f13b20f82238230583bf13

                                                                          SHA256

                                                                          7ea2b4d03c4d7cc81408ce73dca31df58e8b59c6ffc7e626f864c0d2781a76a5

                                                                          SHA512

                                                                          1d7f91e2e4646bb9d86e2962d1f7f4085df2bf61d619c6f116ed8536055d2c932a2e73c7177a5338e1ceb63454d9f3280278428e052d0b2b9b59ea7be96fee00

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          23KB

                                                                          MD5

                                                                          19bcac65c2fff9fa839049e71d4f1361

                                                                          SHA1

                                                                          9974ef5e09af75f461a5d69fb531d17fad9c6dbc

                                                                          SHA256

                                                                          10d3358576e673f03953eabb5a84928b99e1e2ad653a9dc67cd0bb9881624972

                                                                          SHA512

                                                                          7bf6efa9a4f96f46bf56a94784b4da7acf7a19e718b350d1a446c32ac455bc8645ae0fc34fa60e80ec71ede0f3592ddd395c4607457de68ca049f4717b0f856c

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          506a944f31da832338e92eb21e3c197d

                                                                          SHA1

                                                                          dfb2f29379685aea82777aa0836c0762ae2d83cd

                                                                          SHA256

                                                                          c65ebbf67d29d1720a1123c9bf991809bff14b360ea8f28d6b6c833ac27a2034

                                                                          SHA512

                                                                          30c3e874d3cb09b98b6026c0b23ecbc98cdff98b25b96b5915b48d6481aaba6dcb5119803bc44def6407724f1f386afbb7026ffd215ff9d19ebf0c95dea06827

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          437c63ee94d87b980d6dccde79abaaf3

                                                                          SHA1

                                                                          8387c872639dc260ff7f6414bdfaff5ccdc20628

                                                                          SHA256

                                                                          d153596239a08b40982c8106cdc0f68f84581161e3df792d4d1a0e5f7ced00ff

                                                                          SHA512

                                                                          86c98e118e10738cf5477b27373bca58ab26035f1126fe8c981994868de39dd0b20d90aaaf2e26e384f89f0c5078d5744daa12433bf51d4c470358b1dc74c781

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          25KB

                                                                          MD5

                                                                          72a45b139c49cd0e73707e75d9ee95d0

                                                                          SHA1

                                                                          57acfab6527fc1faae43299a78755b7545841a60

                                                                          SHA256

                                                                          22ff531976ad5e1effab9b7276f9b6a7183eb9aad9f67e6426052aef5f242cb6

                                                                          SHA512

                                                                          ccb314c34b55e9ccab5d6a5e84a1fb7f114e8252085c22993b82c5aee6bbfebfedc58b43d82e047c7bc95fdb3935111bfb9f94cd68b50c7fce72af83dc281b72

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          6fcae44b27731524343467e08c8b3e7b

                                                                          SHA1

                                                                          17d6cbbde1c8fc23f8d2991c20b8737c041fb9cc

                                                                          SHA256

                                                                          2813bb15942d35893c94cc000ce1023c978826d175e22461a2711753996fc11e

                                                                          SHA512

                                                                          b2df258b72f69689dc4ae794fe4b17f7affe8a9b268e086a67b0cab0cda4fe0c564da9294a59a636cb1a07d2fab1e289a064e44fcc49f0b8c0b49b30100082e4

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          23KB

                                                                          MD5

                                                                          053ac2777798a01541d84ab1a7ef1ed3

                                                                          SHA1

                                                                          65f5657381aaaa7784aa986df961586fa1911fd0

                                                                          SHA256

                                                                          5e1ed9cfd7a585437f49786ed408337915e356e527f1d0d10ea21b0d07129331

                                                                          SHA512

                                                                          af933a27904365b5ba35095d7424775f16d20c80b40372379ca9c09e1633f1b5836dbd2e999ce0661a02c9af255987dad62ab2fe3bc330476ae937fef408f43c

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          25KB

                                                                          MD5

                                                                          8d7149a2ae3b028d64a6ee3f2fc0f50c

                                                                          SHA1

                                                                          54c44b31049ba2d6ab192f74ffe23dae76aaab55

                                                                          SHA256

                                                                          23811675666cdd52799a94a546aae55dfc4282df31fd5fb03dec5dcd0883ddb2

                                                                          SHA512

                                                                          357a4a8bfa68828a554c02a36af7e15ebc151e906fe2403bea6e5da8f9f0a328e261a81cbc4742eaa53de9ca3c3251d28d0ea61760705f2adad6c1f6b69bf5bf

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          25KB

                                                                          MD5

                                                                          563e91eb848b2bc833255169bd766ec9

                                                                          SHA1

                                                                          d0a6b60ceb7b1e9773f68ca432eb0bc2bc1b3aac

                                                                          SHA256

                                                                          9c69b0e529c0c001b53e81e266837e04e952db97eb15596800779b16e3aec800

                                                                          SHA512

                                                                          e3c92d0d1cd32eb663bd788e94670d56bb268db2ab1977e7a53e11ecdf0b41e32a240e9db5d3eaad64a5e07b40f4db830e5e6f682053ff7e7e87d632be5c4faa

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          f0f596216f1ce36a10138566d56a7422

                                                                          SHA1

                                                                          3c06bc1a3d2eb991a9991efa998d48045138ed8b

                                                                          SHA256

                                                                          6195239ee750612a40907d4dad1d27ba936dcafb4b76c9b304f74628bca9c2bd

                                                                          SHA512

                                                                          b5ac15d4eff2224f221d871af983cccc950ab360b384a844045b9d7900081f63e2724d6ab139c607e31a5b66ca345c81f95406d46629cb6948576e98dbd843b0

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          65811042b93bf08b45b14be7f7e9d589

                                                                          SHA1

                                                                          5919cbf7f8f9111765a51718121bd4908cd73143

                                                                          SHA256

                                                                          e02f2d8e32f8f86e9846916d9187e55b4caa7af14734cbdf96d9ec7e0dc913b7

                                                                          SHA512

                                                                          f2ac2cc24eeaa5df8515c6cdfd13e713e04d56fa3576c64e637dea2f831bae585d3fbf4e84149ce239f40652d4184274e304d26c151cbc4d4687c6fb394a6112

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\1a97a7cf-2d1f-49ce-af5a-fc95ec868463

                                                                          Filesize

                                                                          982B

                                                                          MD5

                                                                          3db915f6431808c94731ab910e2afecb

                                                                          SHA1

                                                                          39287906733b6fca8d165a133101d10d508d249d

                                                                          SHA256

                                                                          cccfa83d120bc85d1a26dde086bf6a1308b17a21aeafee5fc6f568d473cd6bd1

                                                                          SHA512

                                                                          4231ce9e2852d565bae2d48afa5297c50786305a566811adfae9626849e0e0f5be270b24e2fcef1dfc0fb1f1ca5d57193bf924df8d982a98153c003dc0f297be

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\49efe6db-bf12-41fb-967b-0c920fe70dc6

                                                                          Filesize

                                                                          659B

                                                                          MD5

                                                                          fe0a956dfbc1e6c894b8bfa8df83c5ae

                                                                          SHA1

                                                                          2c774d9472858171bc5c8141402b6c29110f14bc

                                                                          SHA256

                                                                          e280b41021ac8b51f0ce6a97213a864d88dad5b05717eaac67d5f40c7a4ea9a6

                                                                          SHA512

                                                                          f42cd73f780d340da8b89f68953ec8d9e58c2d7c942dbfc0776952dd26cdf4c5aec24a3a0efafda04b6b9aa01eaebe7dbafddc7a7ea8e0136c79177f3cf22ca8

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          842039753bf41fa5e11b3a1383061a87

                                                                          SHA1

                                                                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                          SHA256

                                                                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                          SHA512

                                                                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                          Filesize

                                                                          116B

                                                                          MD5

                                                                          2a461e9eb87fd1955cea740a3444ee7a

                                                                          SHA1

                                                                          b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                          SHA256

                                                                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                          SHA512

                                                                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                          Filesize

                                                                          372B

                                                                          MD5

                                                                          bf957ad58b55f64219ab3f793e374316

                                                                          SHA1

                                                                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                          SHA256

                                                                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                          SHA512

                                                                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                          Filesize

                                                                          17.8MB

                                                                          MD5

                                                                          daf7ef3acccab478aaa7d6dc1c60f865

                                                                          SHA1

                                                                          f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                          SHA256

                                                                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                          SHA512

                                                                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\places.sqlite-wal

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          5ad9924abbc3e87338b23b16768563ca

                                                                          SHA1

                                                                          6030dd687f071536738b0177a6f68bdea859f00f

                                                                          SHA256

                                                                          673b7e4e9ceac43f73074a7896ae2daa613c0e87373a0c1efad1a894e6ceebd1

                                                                          SHA512

                                                                          dc3f16bb3b57ab813b7edc6cf8e829ba8b720ad706e15202502553707e3181d4aa5f803916d88270fc3c04b137df74a7c23d555e8342a1a4de2abc4d198a313c

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          79abb612ea7b752d6b14c4bf83824406

                                                                          SHA1

                                                                          d7fb84cf41d474b306f32e91b3d8f035306d6dea

                                                                          SHA256

                                                                          55b4aae96863dfd6e8de4eb3a64c3946e51febb114dcf81d5ddbaffe42acd075

                                                                          SHA512

                                                                          2ef897943a021ad028a646e03d4af81e65523d282cf324b573cf66fe7a544157e4d57fcf665f0eb7846eb0154e629544175fc015f5ec696564623ae67764814e

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          a446e809087d186d64915a47011ace39

                                                                          SHA1

                                                                          2b9def036cb7afd09453f6788d724b8fd5622739

                                                                          SHA256

                                                                          95884ed6716b0a52826173efbac04588317723eac4c03c7bf4a7e6ccca0b87bb

                                                                          SHA512

                                                                          84b5013afe2a5fa7315b79b9f26aa794309153628e814dcab795ca9d70620296e8d5bbffb52357deaf41bcb6f7f735ab772c9dea72d0ad62742eac38f0fc1102

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          71a17de3e6b66928b61a5b6b5e396f01

                                                                          SHA1

                                                                          1454911ae4dd60b661115995b2a3850f30078186

                                                                          SHA256

                                                                          82cd9a2a49e771eaa2543fdfa7b07b55f423be8d40cc651b1c2d582725600c7b

                                                                          SHA512

                                                                          c1c892d290cf6d85dcf483fd7ba8b36bda6e63cf76b78785504d26f028d0736ffb121782487754c529ae0570e37ca900cf21125d8d68120faa2364fd864713c1

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                                          Filesize

                                                                          15KB

                                                                          MD5

                                                                          153a908702d1f2b76805e7d177b08411

                                                                          SHA1

                                                                          3f85b090b30c37ee75b0fe50d8c96b7585d5487d

                                                                          SHA256

                                                                          3ec01ba7905a9017365915aec604bdd25915676373192d18663f6556ef1fb53a

                                                                          SHA512

                                                                          47ab9e2dcb3d251d06d5c83a99125027a24784a1c936c463f5a97a969bd1764ffd3065dd33f972a03d32a8870fd64e206f1d0f041cec479b45ffbde3224cbae8

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          af98c43e595136713f0406465fac5b3c

                                                                          SHA1

                                                                          1e9881c7189807f4eeadc549c2d37a01fc676dc5

                                                                          SHA256

                                                                          e566f7c1be93a2b0eaccd7a56004c6156c4958bc9bcb7cff7b23211c878c9a63

                                                                          SHA512

                                                                          2e18eacd603838626de259c5d9431bc50af54b5ddc57b71f78d2e6681841acde82bcee6e93bec22ecad4c2803944abbf287e88d9a13348439afa067cc0d1924f

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\security_state\data.safe.bin

                                                                          Filesize

                                                                          2.9MB

                                                                          MD5

                                                                          09b136ce16a665b7c4fa18a5bd2d9286

                                                                          SHA1

                                                                          44b6f04c46520d36ea424659e42b22251c95c759

                                                                          SHA256

                                                                          d6f5712db0f7ad09ed832db20a3bf1da072581fe65c309e5bcf733424687ff51

                                                                          SHA512

                                                                          2cf08bf7ac36747bab9ac4a665b71a5d01b9653f92ea93275e4f8216b4909b384e5d5987052ea84e0b2a8e9c378db2140509e8c7c4234c66c43e0cf9ec2e432b

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                          Filesize

                                                                          2.2MB

                                                                          MD5

                                                                          851a279492c9166c1a3cbe4014858de4

                                                                          SHA1

                                                                          b3f7567b6c6898505c46ed21f1c971c1863115fd

                                                                          SHA256

                                                                          7d8c62e09be8799d31722c524af038998e5e316353d412a92d125eb5b29326a6

                                                                          SHA512

                                                                          4a608435dc47e78c97229a6836dabcdd00976e85a11796dd020d9e2705d59511e32dbd49077ba299c830ce04e7dcd65b195913b20f741812c446db6b7ce9ce66

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                          Filesize

                                                                          2.4MB

                                                                          MD5

                                                                          9da8e15ed971f7c308e7a18160d64313

                                                                          SHA1

                                                                          4b3b89a5eef1d338c5be7d862ba1b7fabea1286f

                                                                          SHA256

                                                                          fba181bfb8b58da88dccfd5caeb23297a296e2dd8adfd9eac7c33eb16232a780

                                                                          SHA512

                                                                          2a842788dba511c066875cee20820fa28cdc94dc39213a7acf3fcb17e2a6c78ad161035c41d0a595d12d38a9c6d7d7f924f19de0c16db61adc045a0077e4ffa3

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                          Filesize

                                                                          9.3MB

                                                                          MD5

                                                                          b4a4b7d2ae8155e3fff4613d616167a8

                                                                          SHA1

                                                                          323ef4e807af146f0faed4bc703a843e181c87a0

                                                                          SHA256

                                                                          2a574273be3c35acf2bf81132f7a9edb8ef34cdda8b92fc77c9d2bc3f164717a

                                                                          SHA512

                                                                          e69ceb752b76a4ff28a8e42964dd346828b4ecee81595d6de71477e52d774e09f7008541bce99370d2d8a85ca547d47377894d5c9ac00c8ae6a3f06ec5ea4ec6

                                                                        • C:\Users\Admin\Documents\HIDBFCBGDB.exe

                                                                          Filesize

                                                                          3.1MB

                                                                          MD5

                                                                          36799cea6d5c3535f8debe08619965a9

                                                                          SHA1

                                                                          59d8c247f00ae3a48b2ee1de019d681dbf1220fb

                                                                          SHA256

                                                                          aa6e733a2be885068d9e8f4d8134c49102893676c80b60b1b876eaf1f97786ee

                                                                          SHA512

                                                                          b6381637a3e7a8eff98020855bb131fc43b348914b4f6a0f0335e9a7671682f23553a0a62776248bd08e0cba42735c4dad5fec86110fecb6b10b6d7340483eae

                                                                        • memory/1608-1489-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/1608-51-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                          Filesize

                                                                          972KB

                                                                        • memory/1608-1494-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/1608-531-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/1608-539-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/1608-44-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/1608-679-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/1608-1442-0x0000000000F90000-0x000000000148F000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/2004-1725-0x0000000000380000-0x0000000000818000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2004-1641-0x0000000000380000-0x0000000000818000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/2064-40-0x0000000000350000-0x0000000000801000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2064-39-0x0000000000350000-0x0000000000801000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2444-4364-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                          Filesize

                                                                          344KB

                                                                        • memory/2772-33-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-1817-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-4343-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-1431-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-109-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-4041-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-4371-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-4381-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-135-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-4358-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-636-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-1483-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2772-3183-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/2856-117-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                          Filesize

                                                                          344KB

                                                                        • memory/2856-119-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                          Filesize

                                                                          344KB

                                                                        • memory/2856-121-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                          Filesize

                                                                          344KB

                                                                        • memory/2924-4386-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                          Filesize

                                                                          7.4MB

                                                                        • memory/2924-4387-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                          Filesize

                                                                          7.4MB

                                                                        • memory/2924-4388-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                          Filesize

                                                                          7.4MB

                                                                        • memory/2924-4385-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                          Filesize

                                                                          7.4MB

                                                                        • memory/2924-4384-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                          Filesize

                                                                          7.4MB

                                                                        • memory/3064-707-0x0000000000040000-0x0000000000302000-memory.dmp

                                                                          Filesize

                                                                          2.8MB

                                                                        • memory/3064-1448-0x0000000000040000-0x0000000000302000-memory.dmp

                                                                          Filesize

                                                                          2.8MB

                                                                        • memory/3064-722-0x0000000000040000-0x0000000000302000-memory.dmp

                                                                          Filesize

                                                                          2.8MB

                                                                        • memory/3064-723-0x0000000000040000-0x0000000000302000-memory.dmp

                                                                          Filesize

                                                                          2.8MB

                                                                        • memory/3064-1444-0x0000000000040000-0x0000000000302000-memory.dmp

                                                                          Filesize

                                                                          2.8MB

                                                                        • memory/4236-3293-0x0000021603350000-0x0000021603372000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/4596-21-0x0000000000730000-0x0000000000A48000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/4596-34-0x0000000000730000-0x0000000000A48000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/5488-4351-0x0000000000400000-0x0000000000C80000-memory.dmp

                                                                          Filesize

                                                                          8.5MB

                                                                        • memory/5488-4352-0x0000000000400000-0x0000000000C80000-memory.dmp

                                                                          Filesize

                                                                          8.5MB

                                                                        • memory/5488-4362-0x0000000000400000-0x0000000000C80000-memory.dmp

                                                                          Filesize

                                                                          8.5MB

                                                                        • memory/5488-4374-0x0000000000400000-0x0000000000C80000-memory.dmp

                                                                          Filesize

                                                                          8.5MB

                                                                        • memory/5488-4339-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                          Filesize

                                                                          112KB

                                                                        • memory/5488-4332-0x0000000000400000-0x0000000000C80000-memory.dmp

                                                                          Filesize

                                                                          8.5MB

                                                                        • memory/5488-4380-0x0000000000400000-0x0000000000C80000-memory.dmp

                                                                          Filesize

                                                                          8.5MB

                                                                        • memory/5752-1700-0x0000000000A70000-0x0000000000F78000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/5752-616-0x0000000000A70000-0x0000000000F78000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/5752-1640-0x0000000000A70000-0x0000000000F78000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/5752-1473-0x0000000000A70000-0x0000000000F78000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/5752-1308-0x0000000000A70000-0x0000000000F78000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/5752-736-0x0000000000A70000-0x0000000000F78000-memory.dmp

                                                                          Filesize

                                                                          5.0MB

                                                                        • memory/5916-532-0x0000000000CE0000-0x0000000001177000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/5916-549-0x0000000000CE0000-0x0000000001177000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/6380-3497-0x0000000000020000-0x0000000000C85000-memory.dmp

                                                                          Filesize

                                                                          12.4MB

                                                                        • memory/6380-4333-0x0000000000020000-0x0000000000C85000-memory.dmp

                                                                          Filesize

                                                                          12.4MB

                                                                        • memory/6380-4349-0x0000000000020000-0x0000000000C85000-memory.dmp

                                                                          Filesize

                                                                          12.4MB

                                                                        • memory/6380-4331-0x0000000000020000-0x0000000000C85000-memory.dmp

                                                                          Filesize

                                                                          12.4MB

                                                                        • memory/6700-4043-0x0000000000630000-0x00000000012AA000-memory.dmp

                                                                          Filesize

                                                                          12.5MB

                                                                        • memory/6700-4059-0x0000000000630000-0x00000000012AA000-memory.dmp

                                                                          Filesize

                                                                          12.5MB

                                                                        • memory/6712-4383-0x00007FF6AF410000-0x00007FF6AF8A0000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/6712-4397-0x00007FF6AF410000-0x00007FF6AF8A0000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/6724-1490-0x0000000000470000-0x0000000000796000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/6724-1493-0x0000000000470000-0x0000000000796000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/6724-4382-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/6840-3273-0x00007FF7F3FA0000-0x00007FF7F4430000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/6840-3267-0x00007FF7F3FA0000-0x00007FF7F4430000-memory.dmp

                                                                          Filesize

                                                                          4.6MB

                                                                        • memory/6896-2945-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/6896-2925-0x0000000000E20000-0x0000000001138000-memory.dmp

                                                                          Filesize

                                                                          3.1MB

                                                                        • memory/6908-2140-0x0000000000FF0000-0x00000000012A2000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/6908-1500-0x0000000000FF0000-0x00000000012A2000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/6908-1499-0x0000000000FF0000-0x00000000012A2000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/6908-1497-0x0000000000FF0000-0x00000000012A2000-memory.dmp

                                                                          Filesize

                                                                          2.7MB

                                                                        • memory/6908-2046-0x0000000000FF0000-0x00000000012A2000-memory.dmp

                                                                          Filesize

                                                                          2.7MB