Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 05:20

General

  • Target

    a2fd808737f2b05bc5ed2149cfd06011fcb8b79fb3a50318b35976ab80dcb97b.exe

  • Size

    2.8MB

  • MD5

    a0c024f437dfac1ab3d4a6baf03c039d

  • SHA1

    8012b1cb4296e772c47582e23ffd9a3d1830cdf7

  • SHA256

    a2fd808737f2b05bc5ed2149cfd06011fcb8b79fb3a50318b35976ab80dcb97b

  • SHA512

    4f27bb42f7ed490795d6b2229e6883da88d6bbac99065cf85bfd2712aa2478b990dcc9b98e179e6794e1a0ccee3b547eb40e34182fef35b21578aa66815ba8c5

  • SSDEEP

    49152:qp7gdvGyTA3H5OkC15FpHxnQQK+1nIFHFaJEix1v8KV:qudvGcSH5Ok65FpRnPIF2Eix1kW

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

cryptbot

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • XMRig Miner payload 10 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 38 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2fd808737f2b05bc5ed2149cfd06011fcb8b79fb3a50318b35976ab80dcb97b.exe
    "C:\Users\Admin\AppData\Local\Temp\a2fd808737f2b05bc5ed2149cfd06011fcb8b79fb3a50318b35976ab80dcb97b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe
        "C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:440
        • C:\Users\Public\Netstat\FuturreApp.exe
          "C:\Users\Public\Netstat\FuturreApp.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2956
      • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe
        "C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe
          "C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1748
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 324
          4⤵
          • Program crash
          PID:836
      • C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe
        "C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2248
      • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
        "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
          "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5024
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 312
          4⤵
          • Program crash
          PID:1016
      • C:\Users\Admin\AppData\Local\Temp\1019918001\ddcf06b2ab.exe
        "C:\Users\Admin\AppData\Local\Temp\1019918001\ddcf06b2ab.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:540
      • C:\Users\Admin\AppData\Local\Temp\1019919001\ed53d2b33d.exe
        "C:\Users\Admin\AppData\Local\Temp\1019919001\ed53d2b33d.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Users\Admin\AppData\Local\Temp\1019919001\ed53d2b33d.exe
          "C:\Users\Admin\AppData\Local\Temp\1019919001\ed53d2b33d.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3636
      • C:\Users\Admin\AppData\Local\Temp\1019922001\565c60ed88.exe
        "C:\Users\Admin\AppData\Local\Temp\1019922001\565c60ed88.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3948
      • C:\Users\Admin\AppData\Local\Temp\1019923001\376c25d7bc.exe
        "C:\Users\Admin\AppData\Local\Temp\1019923001\376c25d7bc.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1200
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2392
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe7577cc40,0x7ffe7577cc4c,0x7ffe7577cc58
            5⤵
              PID:4584
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,16490221893437943804,9156079520675020344,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:2
              5⤵
                PID:2176
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,16490221893437943804,9156079520675020344,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3
                5⤵
                  PID:1856
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,16490221893437943804,9156079520675020344,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:8
                  5⤵
                    PID:3240
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,16490221893437943804,9156079520675020344,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1696
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,16490221893437943804,9156079520675020344,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2260
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4240,i,16490221893437943804,9156079520675020344,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4044
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                  4⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:6232
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe76a946f8,0x7ffe76a94708,0x7ffe76a94718
                    5⤵
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:6248
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:2
                    5⤵
                      PID:6572
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1852 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:6580
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
                      5⤵
                        PID:6752
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:6828
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:6840
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:1448
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:3952
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:2
                        5⤵
                          PID:5472
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
                          5⤵
                            PID:6108
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2520 /prefetch:2
                            5⤵
                              PID:6992
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2520 /prefetch:2
                              5⤵
                                PID:5832
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3884 /prefetch:2
                                5⤵
                                  PID:6844
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13451606456115777347,15842654396479257013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2004 /prefetch:2
                                  5⤵
                                    PID:688
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\BGIJEGCGDG.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5972
                                  • C:\Users\Admin\Documents\BGIJEGCGDG.exe
                                    "C:\Users\Admin\Documents\BGIJEGCGDG.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    PID:5968
                              • C:\Users\Admin\AppData\Local\Temp\1019924001\0cb384054d.exe
                                "C:\Users\Admin\AppData\Local\Temp\1019924001\0cb384054d.exe"
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of WriteProcessMemory
                                PID:2656
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM firefox.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1640
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM chrome.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1464
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM msedge.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2952
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM opera.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1640
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM brave.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5012
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                  4⤵
                                    PID:2700
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                      5⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4312
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1872 -parentBuildID 20240401114208 -prefsHandle 1812 -prefMapHandle 1804 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2248992a-bf78-4fbe-8364-67f3477d37c8} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" gpu
                                        6⤵
                                          PID:3932
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2388 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6d068f3-bda7-40e4-937e-7d7a7a77ae26} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" socket
                                          6⤵
                                            PID:4140
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3180 -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3196 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b8839e3-6c13-4960-a0a8-d9940fa23329} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab
                                            6⤵
                                              PID:5340
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2636 -childID 2 -isForBrowser -prefsHandle 2532 -prefMapHandle 1232 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ddd04ee-c734-4970-848b-57db79d2db84} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab
                                              6⤵
                                                PID:5552
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4920 -prefMapHandle 4940 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {402edacc-7e9d-474f-819c-d5c5976bcd30} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" utility
                                                6⤵
                                                • Checks processor information in registry
                                                PID:6464
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5112 -childID 3 -isForBrowser -prefsHandle 5068 -prefMapHandle 5064 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fa0cb8b-371a-45d6-8d48-901e80a1e9f6} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab
                                                6⤵
                                                  PID:6476
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4352 -childID 4 -isForBrowser -prefsHandle 5156 -prefMapHandle 5160 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d252426f-22b2-4806-9e7f-3967982ece69} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab
                                                  6⤵
                                                    PID:6620
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 5 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ace865e4-ded4-4c36-8e64-59aaf27291d5} 4312 "\\.\pipe\gecko-crash-server-pipe.4312" tab
                                                    6⤵
                                                      PID:6664
                                              • C:\Users\Admin\AppData\Local\Temp\1019925001\149c726d82.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1019925001\149c726d82.exe"
                                                3⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2424
                                              • C:\Users\Admin\AppData\Local\Temp\1019926001\11c98b79d4.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1019926001\11c98b79d4.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:6024
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6024 -s 1480
                                                  4⤵
                                                  • Program crash
                                                  PID:5820
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6024 -s 1012
                                                  4⤵
                                                  • Program crash
                                                  PID:6184
                                              • C:\Users\Admin\AppData\Local\Temp\1019927001\727ab143dc.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1019927001\727ab143dc.exe"
                                                3⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2864
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                                  4⤵
                                                    PID:5912
                                                    • C:\Windows\system32\mode.com
                                                      mode 65,10
                                                      5⤵
                                                        PID:5600
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5996
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_7.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:6008
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_6.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3348
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_5.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2820
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_4.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4640
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_3.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5764
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_2.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2228
                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                        7z.exe e extracted/file_1.zip -oextracted
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3720
                                                      • C:\Windows\system32\attrib.exe
                                                        attrib +H "in.exe"
                                                        5⤵
                                                        • Views/modifies file attributes
                                                        PID:952
                                                      • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                                        "in.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:4068
                                                        • C:\Windows\SYSTEM32\attrib.exe
                                                          attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                          6⤵
                                                          • Views/modifies file attributes
                                                          PID:6540
                                                        • C:\Windows\SYSTEM32\attrib.exe
                                                          attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                          6⤵
                                                          • Views/modifies file attributes
                                                          PID:1796
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                                          6⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4612
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell ping 127.0.0.1; del in.exe
                                                          6⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5852
                                                          • C:\Windows\System32\Conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            7⤵
                                                              PID:5996
                                                            • C:\Windows\system32\PING.EXE
                                                              "C:\Windows\system32\PING.EXE" 127.0.0.1
                                                              7⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:4728
                                                    • C:\Users\Admin\AppData\Local\Temp\1019928001\92c9861325.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019928001\92c9861325.exe"
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6216
                                                      • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
                                                        4⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5100
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll, Main
                                                          5⤵
                                                          • Blocklisted process makes network request
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1904
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\cred64.dll, Main
                                                          5⤵
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:6320
                                                          • C:\Windows\system32\rundll32.exe
                                                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\cred64.dll, Main
                                                            6⤵
                                                            • Blocklisted process makes network request
                                                            • Loads dropped DLL
                                                            PID:6760
                                                            • C:\Windows\system32\netsh.exe
                                                              netsh wlan show profiles
                                                              7⤵
                                                              • Event Triggered Execution: Netsh Helper DLL
                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                              PID:6612
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\932230532004_Desktop.zip' -CompressionLevel Optimal
                                                              7⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:6000
                                                    • C:\Users\Admin\AppData\Local\Temp\1019929001\816a951d8b.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019929001\816a951d8b.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Drops file in Program Files directory
                                                      PID:6976
                                                      • C:\Program Files\Windows Media Player\graph\graph.exe
                                                        "C:\Program Files\Windows Media Player\graph\graph.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:1556
                                                    • C:\Users\Admin\AppData\Local\Temp\1019930001\44ef1ffe79.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019930001\44ef1ffe79.exe"
                                                      3⤵
                                                      • Enumerates VirtualBox registry keys
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4628
                                                    • C:\Users\Admin\AppData\Local\Temp\1019931001\59032c0147.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019931001\59032c0147.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6648
                                                    • C:\Users\Admin\AppData\Local\Temp\1019932001\40dfa6c40c.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019932001\40dfa6c40c.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6032
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 480
                                                        4⤵
                                                        • Program crash
                                                        PID:6616
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:860
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4544 -ip 4544
                                                  1⤵
                                                    PID:4296
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2112 -ip 2112
                                                    1⤵
                                                      PID:4288
                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                      1⤵
                                                        PID:960
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6024 -ip 6024
                                                        1⤵
                                                          PID:5472
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6024 -ip 6024
                                                          1⤵
                                                            PID:6164
                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                            1⤵
                                                              PID:5764
                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              PID:6248
                                                            • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                              C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              PID:5068
                                                            • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                              C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              PID:6368
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                2⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4948
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                2⤵
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3404
                                                                • C:\Windows\system32\PING.EXE
                                                                  "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                  3⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:6932
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6032 -ip 6032
                                                              1⤵
                                                                PID:6724

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\ProgramData\mozglue.dll

                                                                Filesize

                                                                593KB

                                                                MD5

                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                SHA1

                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                SHA256

                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                SHA512

                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                Filesize

                                                                2B

                                                                MD5

                                                                d751713988987e9331980363e24189ce

                                                                SHA1

                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                SHA256

                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                SHA512

                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                Filesize

                                                                686B

                                                                MD5

                                                                cddeef67e577ca89d8b086e896d9ada6

                                                                SHA1

                                                                6ebd227648ae007b7e4bdd006d836b400c196ee3

                                                                SHA256

                                                                5ae3d0adc1dcf1b9e1b37b1d0d2f21bdae1cdef787cf05a280a5fb97eae18c18

                                                                SHA512

                                                                be6c56ca9cc31375b36d5943d93b31aed40803379f97ee4dd649024da50a6a6a46df5358ce232d86580a292a1e345e3f3f4350368e8260eec8607f744812ffc8

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                Filesize

                                                                820B

                                                                MD5

                                                                351831b5293d49de56558b9c08174989

                                                                SHA1

                                                                b65f7e5733617ce05f980c36cd78de8930747cb4

                                                                SHA256

                                                                a9724820b52b35ddf09224de1358a28081324563cffea14b9e97419de9ae44f7

                                                                SHA512

                                                                8e3d42cea127de66ea53c55d6f78303b74aba44ce625104c32f2b5c6d0a90d34113740d7e4328d772f24a24c24fbbad0d2ced7a7bd0c89759a04c0e3b97e03a0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                Filesize

                                                                150B

                                                                MD5

                                                                5f4119002783862c078db0dc5fc1493b

                                                                SHA1

                                                                1700c335b1674542a6d1227e773fdee464c48c7f

                                                                SHA256

                                                                07bef98145ea2e20778f8bc08cbd89c35ece85628f98e7bc8ff398760f9644b6

                                                                SHA512

                                                                f21641e66491a1f1dcc8acaad3e4588317eb5f0ae0e4d6f229bd28a677e87b04cf2e9da5cda5ebea6671c1e56eaa2d9f2965a6d1c11ed0b98bde07e5df13d5dd

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                Filesize

                                                                284B

                                                                MD5

                                                                6841e0e6364acf4acc62da42d6ebb25a

                                                                SHA1

                                                                3fc6fdf230dd7c1870b57cea132415fad82eaac0

                                                                SHA256

                                                                682343e3a7f4bfc68e12359e9ee085a8b248685ae5c1baa2f90cf1ec6eb898d8

                                                                SHA512

                                                                a8981b57f4135c82762fafc872082f574f70c17a785b49b3f89dcd973f9af8e75da0607a032a673fe93d68f60407204edaafc99b36e1550db8417e76cfd0bbf5

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                Filesize

                                                                552B

                                                                MD5

                                                                803958d98117135baa83e38eb0a45e45

                                                                SHA1

                                                                ef16aa27d52d71ec176521cd870ea4bce9286f56

                                                                SHA256

                                                                a1aad76f2446371aad67c1f84362fa77c28103748ae350e14caefa6b8fafe40e

                                                                SHA512

                                                                bd72fdbf38b781f1f807995044b5704da5e2a6a6e204e82bde7a62e0e16a664e426cea68207b1fdd997850753ecda24645bdad5f159340446519a7b0e188f8c2

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\35f518d6-ec6f-4476-9db8-f472831b1395.dmp

                                                                Filesize

                                                                838KB

                                                                MD5

                                                                051af8fb0b86c09c31b63c8ac164e38d

                                                                SHA1

                                                                8710e446726347c2258b41e0d987e474d3cf17f0

                                                                SHA256

                                                                6100bd9bbd3276dc3a0edfa1223867cf3305ba7073b8f455dc4e67c15333a004

                                                                SHA512

                                                                63ff3442097cd7db51005595ca3672caab20e1507ec7808f0ff19dad3a9e7ff93ce63202f75807058f81c3cfd18328ab805d0f19b0d9489e2bfc11c98406df16

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3844bc4c-a8a5-4ff3-9b97-34f21f9eea13.dmp

                                                                Filesize

                                                                830KB

                                                                MD5

                                                                ae3be0819db7a85ea7ca35e6a7febe76

                                                                SHA1

                                                                45b9a5d1ca0e4b3e015ca75efd64867b70afc6d7

                                                                SHA256

                                                                3ba6b7d247c8365e702812444948708b3fd6b3af9a3531f53910f370043b930c

                                                                SHA512

                                                                93cbf7f3aa52afd205cc8ddf126d858c82c2d17314cd398dcd90ff2793f25f7c9b37e46a288f7613c69c5f02c849238636c1080ae50118799cd50f494993c3bd

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5346221d-0ed7-4729-900e-1bcfc38ccdf1.dmp

                                                                Filesize

                                                                838KB

                                                                MD5

                                                                011373e95612f173bc4f29881b01e5bf

                                                                SHA1

                                                                b3097286735aca2234c65b27ac40c0d2931db323

                                                                SHA256

                                                                fb1bb1970fc6c1106c65122040dba4820cf0441512746adf2fe6fab8e1e13cb2

                                                                SHA512

                                                                c6333d93ba86b76fe6850e874b718e76708f7873f456d9dd2d1b364edbdea50c74e4dc301ca886372de6c7f71fc834cf972da12d79b720744e390621b76d5e54

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\65829782-250e-43a1-8b6e-9a327b49378c.dmp

                                                                Filesize

                                                                838KB

                                                                MD5

                                                                38b21e9374053c59db380cd06ac57c38

                                                                SHA1

                                                                b60bb7596a8c315fd96dcb6b706dc8e5b5418b48

                                                                SHA256

                                                                150526166785caacfbd2c55bd0e3a477cdec1c68c43ff61c5c52fc16d31a4e0c

                                                                SHA512

                                                                d8caa7c39feaa1b33c506609ddbff61914d088da4a4bd6f6c508a05e56ecaed7b7757fa73a3d73f178cf9c3b58b5c638a2d881809874c065ece8d0d370dc9672

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7481b807-2d20-4b86-924b-4e8309ddcdc5.dmp

                                                                Filesize

                                                                826KB

                                                                MD5

                                                                de8d34f24086f642669e816341a536da

                                                                SHA1

                                                                036990a46c3078788f62c5613fc4278671e4053e

                                                                SHA256

                                                                a33a4d5afdc61238da4c490bda8b167e5f8e33445e0d7d6cab27d77bac1e7cf6

                                                                SHA512

                                                                064b33f293b3b31efbcbaad05d120e032c64edb4c8e7a8a945559bbfca9105d7e49332b32a7dbbeef92b4e45ab9e971bbeaffc85986cd8d90f0efda9e5d1d015

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\aa4c6323-44ef-4526-9d9f-85f28a7df74e.dmp

                                                                Filesize

                                                                826KB

                                                                MD5

                                                                20f10883631ea8b9ace22002cccc2b21

                                                                SHA1

                                                                b68dfedbd76af55148f1b2eb69cfd49a4e2ee3fe

                                                                SHA256

                                                                7c74e379d149363d9965e8df65530f9d57b97a06760befa51871f0ddca29b521

                                                                SHA512

                                                                3d2b940e06338638c6b542970d24a60f5471c21c36dc24c53d2fcc444238197f66151ac2039c2ff1d1a70cb37d8a917075b9e977c42dfef9cef5b3d0fcd166e5

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                d52438fc7fcd74b55765800f57384268

                                                                SHA1

                                                                d31bace7aac704dbf5359e01aca2c9d3ae5f6dd1

                                                                SHA256

                                                                f0d00b94562c3bba4e20130d7055205ee5c7f4e279191059fc15dfedb90365b3

                                                                SHA512

                                                                56ed1f8357dc8e4e9bfe3b32b9aa4e34200473f16a34ba18f72f2d06701fcae966ad6ec9bcd4e254c6f3353cde0ae57e481d9d113f4924890f56970e1c24d21d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                37f660dd4b6ddf23bc37f5c823d1c33a

                                                                SHA1

                                                                1c35538aa307a3e09d15519df6ace99674ae428b

                                                                SHA256

                                                                4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                                SHA512

                                                                807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                d7cb450b1315c63b1d5d89d98ba22da5

                                                                SHA1

                                                                694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                                SHA256

                                                                38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                                SHA512

                                                                df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                62829029ecd646d5a6a331e589dbb821

                                                                SHA1

                                                                059c5dda36da8b3ff0e4cc48989fc5340065fab0

                                                                SHA256

                                                                6dd86c127e7e43dee49eaad3469550cd6938835ea6cbab9d1acbb89b4f0f5313

                                                                SHA512

                                                                9f5fc8f1a936e20b596fe9f62f17299bca637ce041f132b9a1893c89c2ab6001a4aad6abddf020c87b008cb2699b75a6f8677f792dfa8f7a24888717d2a2c909

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                0eee3e1d2acd4b469d579f6328f88233

                                                                SHA1

                                                                491ebea1e623db59d435ae6818a9356a636c5b24

                                                                SHA256

                                                                1d88a10d57916fb6cf36292b84eae11b6882369f19713bc859a620097fbb982d

                                                                SHA512

                                                                0b5d31fbe9ac61084306742483748d565948adce87ac263ebbab2b699569eb6e0dab82b1c1a8802a778a71ab3c8d844b629594ef9ce79badd8c1e2480759d606

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                90dc37c02d6b30f2fc4760423d968766

                                                                SHA1

                                                                cef96a1d23f6ddd3cb7e828268701aae9cd4ff73

                                                                SHA256

                                                                6f0d0aefc3adaa7b60c8d74590493b2fb7ed7395b4e7c69e899e690047d9cd9d

                                                                SHA512

                                                                47930246a2880c1e6579c76b77163aad031874afb1001d2faa28291d7c6a1dd6a7815d6de603d4fb715877517f5fc7550d41ae03191da3eea45f488e37a8f62b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                Filesize

                                                                264KB

                                                                MD5

                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                SHA1

                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                SHA256

                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                SHA512

                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DQ67RYHS\download[1].htm

                                                                Filesize

                                                                1B

                                                                MD5

                                                                cfcd208495d565ef66e7dff9f98764da

                                                                SHA1

                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                SHA256

                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                SHA512

                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                                                                Filesize

                                                                24KB

                                                                MD5

                                                                df4e019dbf53d4df3102be8508cb0ec2

                                                                SHA1

                                                                26a749573bcac53bd843ce3ee6f933e241f2ee06

                                                                SHA256

                                                                62d793c6a387f67287f681736970a3284274df6485c8ad57610e0a0d57abea67

                                                                SHA512

                                                                69c10bb5ae3d21bf44de7333c85516b0fce3e734e4db662b76f35bd531abd07c6a339e500f6a9aed6e063fffba63caaed97dad83b757a7f583b8835c818b8005

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31

                                                                Filesize

                                                                13KB

                                                                MD5

                                                                763845e55a60e356e4a757b52d65343b

                                                                SHA1

                                                                700810579c4a4f942befc0204dd2d98e90715bca

                                                                SHA256

                                                                0515127bdfe53e543d78ceaa3dd204ae583c06ca412911be29f0220e52668547

                                                                SHA512

                                                                7086da888fa656c7dfe834184d4a3ca3c2f84c20618365cda73d753899bbaa8ee7b9c6fc8af1556d6f1217957516b4424cf97026a5d5710e289defc91fab1ec7

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                Filesize

                                                                13KB

                                                                MD5

                                                                63be0a7efb10c89c0bac56925e385fd7

                                                                SHA1

                                                                1bdde7980a2ee5430cf9167ba484c7d2725b9aab

                                                                SHA256

                                                                dd9e8eac65b02082f512db8f0bce27649a12b27feffa7c45328ad0fb3ef102ee

                                                                SHA512

                                                                ec22ce40aa900849fcaae2248516a6e226ef202e0204e28c1b005b847ae32275c6308260501f68867131e429e50e79f385838d2097d2d69f749cd20f048b31ea

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                Filesize

                                                                15KB

                                                                MD5

                                                                96c542dec016d9ec1ecc4dddfcbaac66

                                                                SHA1

                                                                6199f7648bb744efa58acf7b96fee85d938389e4

                                                                SHA256

                                                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                SHA512

                                                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                              • C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                e5f8753995c0b30b827aa2b17f3e1d22

                                                                SHA1

                                                                b268ee165073321cb893fc6dc682adbe38af87b5

                                                                SHA256

                                                                c3a4ec523039d5969745279b8909fbb82bfc999d9241e24b5cefea23a3f2c04f

                                                                SHA512

                                                                dba6104720c45c3201878c515dac487b0f66522e85db56cf19b4378d4da94d38e640eb48259a6ca3fd8602b083283915bdebdc8bb57039f1cdd2fe84792ba2fa

                                                              • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe

                                                                Filesize

                                                                538KB

                                                                MD5

                                                                8339294bc24bf06136ca6eeb31651fb6

                                                                SHA1

                                                                f2a27ecfa302cee73a90e8b8bb9450f36d63ad6d

                                                                SHA256

                                                                78c22e4814c30c5e31c6a12427a908d03d9bdcdebd716514d54c517c131d46d7

                                                                SHA512

                                                                62dcfae552afb890e471f68bbe9267d93e562a715dcd71464e01177e5ce38ecbcf5cda7d501f723a35522036c20e251a986c07de5bd9d91a58ed7e50f47f8692

                                                              • C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe

                                                                Filesize

                                                                295KB

                                                                MD5

                                                                b251cf9e14aa07b1a2e506ad4ee0028c

                                                                SHA1

                                                                3bafd765233c9bc50ba3945446b4153d6f10a41a

                                                                SHA256

                                                                be4ae482b0ca161f7d52dcfecc38e55af4b0a0342b0c1b854329da4f42b6c1cb

                                                                SHA512

                                                                660313d8286535b3acab03c8894d069d7fcb65eb4b5e75026529a096c2337cd68d8a291abf78f612d75b5aec2a413e0936eb16c8c1a94bfda0568dd41312c2c7

                                                              • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe

                                                                Filesize

                                                                543KB

                                                                MD5

                                                                4f36d38adf1aa27764e834263b790397

                                                                SHA1

                                                                c38cd4f1bc7762951225d35e06578b8bd91606d5

                                                                SHA256

                                                                d6a9fcd0a2fccd03908113ac2febc012c36cd007c30ff2e8903e3dd26e189bbd

                                                                SHA512

                                                                76d100555bb8a3ef8529b4dcb9391696b440e5b349f38c36ee1fb1ad8a46aa9289b805511d91597ceaa8dccf8fe64c6130111dcfe09cab0651428c83bd0bce23

                                                              • C:\Users\Admin\AppData\Local\Temp\1019918001\ddcf06b2ab.exe

                                                                Filesize

                                                                2.5MB

                                                                MD5

                                                                87330f1877c33a5a6203c49075223b16

                                                                SHA1

                                                                55b64ee8b2d1302581ab1978e9588191e4e62f81

                                                                SHA256

                                                                98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                                                SHA512

                                                                7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                                                              • C:\Users\Admin\AppData\Local\Temp\1019919001\ed53d2b33d.exe

                                                                Filesize

                                                                758KB

                                                                MD5

                                                                afd936e441bf5cbdb858e96833cc6ed3

                                                                SHA1

                                                                3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                                SHA256

                                                                c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                                SHA512

                                                                928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                                              • C:\Users\Admin\AppData\Local\Temp\1019922001\565c60ed88.exe

                                                                Filesize

                                                                1.8MB

                                                                MD5

                                                                6cc52eb35f095e2a0e4df669c998af29

                                                                SHA1

                                                                82c35ea91513438ca6208b5b41e33bb94ff858d7

                                                                SHA256

                                                                6c9ffc9867092f84baf32fb0fe858b1258df4d371ef2c67c2795e947927d9e7f

                                                                SHA512

                                                                d7d64e55580e02605ab407c36a2798d391e9b3ff82c54c82fcf2331580965d5ef8c091b73aa83d3828d64f6cef5b05f6891a81a28df6b00a8d80d4a16b3a5215

                                                              • C:\Users\Admin\AppData\Local\Temp\1019923001\376c25d7bc.exe

                                                                Filesize

                                                                2.7MB

                                                                MD5

                                                                7ebc22fc52d7d3cc7e66f1a5e92a3a96

                                                                SHA1

                                                                4b1d0403b39e9f8c5a8c69174a018f228c4b82b4

                                                                SHA256

                                                                bea98a74c6bbce2b3b934a2c0ffb593db0b63f190d9b69e99b23a25ca693e94d

                                                                SHA512

                                                                5a63b28f7c81959828055f2f35ff7f7b68681439db9c7d01f5b1c7f8d60d57d576e2c804fae0f5bf341b878b944bb2f8c2df1c295d85a55e5f3c8913111eb2e7

                                                              • C:\Users\Admin\AppData\Local\Temp\1019924001\0cb384054d.exe

                                                                Filesize

                                                                949KB

                                                                MD5

                                                                6bee9f2bac18a037f8cacee461c53b0e

                                                                SHA1

                                                                66bc7a8f98b2cc5defd72056a449bdf82418cf1b

                                                                SHA256

                                                                3930f3f9d9a2f4c631c6fcdb9903f4cd5e8688c9781fc266037230402d5f96fc

                                                                SHA512

                                                                d715b4410f0b4ecf44ddfeb33a3c7c337c966f28c350e2d7feb5735a65264d09d80e9741f4827e11d1f05dd0905139ede39d742c96816971b0044a2f052e9a26

                                                              • C:\Users\Admin\AppData\Local\Temp\1019925001\149c726d82.exe

                                                                Filesize

                                                                2.7MB

                                                                MD5

                                                                7ec325318dcc7fc87f216977703b21ce

                                                                SHA1

                                                                ab28826efe8736c0cfcd210ab6a9d6c7b856ddbc

                                                                SHA256

                                                                8471a31ea98e4960f24fff0ec74f27bf8a95479c3d77015709712ec1bd20de0f

                                                                SHA512

                                                                ffecc82ed635214666f90202b6c4f5b7f78e390081de376352322e8337f4a9244e7055015a765a6cad39e72c1067036cdce44d59f0645d4ba3e2922d2edb5367

                                                              • C:\Users\Admin\AppData\Local\Temp\1019926001\11c98b79d4.exe

                                                                Filesize

                                                                1.8MB

                                                                MD5

                                                                15709eba2afaf7cc0a86ce0abf8e53f1

                                                                SHA1

                                                                238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                                                                SHA256

                                                                10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                                                                SHA512

                                                                65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                                                              • C:\Users\Admin\AppData\Local\Temp\1019927001\727ab143dc.exe

                                                                Filesize

                                                                4.2MB

                                                                MD5

                                                                3a425626cbd40345f5b8dddd6b2b9efa

                                                                SHA1

                                                                7b50e108e293e54c15dce816552356f424eea97a

                                                                SHA256

                                                                ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                SHA512

                                                                a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                              • C:\Users\Admin\AppData\Local\Temp\1019928001\92c9861325.exe

                                                                Filesize

                                                                429KB

                                                                MD5

                                                                51ff79b406cb223dd49dd4c947ec97b0

                                                                SHA1

                                                                b9b0253480a1b6cbdd673383320fecae5efb3dce

                                                                SHA256

                                                                2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                                                                SHA512

                                                                c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                                                              • C:\Users\Admin\AppData\Local\Temp\1019929001\816a951d8b.exe

                                                                Filesize

                                                                591KB

                                                                MD5

                                                                3567cb15156760b2f111512ffdbc1451

                                                                SHA1

                                                                2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                                                SHA256

                                                                0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                                                SHA512

                                                                e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                                                              • C:\Users\Admin\AppData\Local\Temp\1019930001\44ef1ffe79.exe

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                68b362a11fef88da59d833562881dee9

                                                                SHA1

                                                                0177c056b839a7f3eaba2125015ae2ff18ba0d71

                                                                SHA256

                                                                19f9929ec46e2c5d3758308da20138b9cd6f59cd25908eb3f4e07a7ffc1a4df1

                                                                SHA512

                                                                8acef40649b6806e9931fb8937f55d2e8a319b73aa708958385a4763ee51844ef7b5f8e8ebfff7644015affe425e5db2735f07476be5c07c77cff7d2ba69ea38

                                                              • C:\Users\Admin\AppData\Local\Temp\1019931001\59032c0147.exe

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                9eb38afe156ab3fe4ff9db7ecdbafa16

                                                                SHA1

                                                                fdbf1ab0b74fa1c10c60ebcfe315b7f89ff3d52c

                                                                SHA256

                                                                c5121ccf11fc03a7ffdbb0a43ee26b7bcacbb20c3c68fc8e43e89905fa6d45b2

                                                                SHA512

                                                                399f3868eea22b826f16ebd2afd2f4d6af6c9c97cfb6fa750f9b36270ca5387593ab608be6c4599d1e82d3d5f47cca6fb914f4d0591e8e300880d6069386aaa1

                                                              • C:\Users\Admin\AppData\Local\Temp\1019932001\40dfa6c40c.exe

                                                                Filesize

                                                                1.9MB

                                                                MD5

                                                                318ab206533302bee3f52418220616c4

                                                                SHA1

                                                                dd79f144341d04e8e5dfa4fd62eb421ae47a12fd

                                                                SHA256

                                                                fec2828e75fb996ddc2c760b7bddeff17bd4ebb5b36e04b8af6ace4d851d543c

                                                                SHA512

                                                                76bed18a815dd52e5fd68ceb1fd1fa5cca95c00eaeede442edc448d28b52845df081afdb75030f3c1d639cdce2a4daadf7bbc9bdc2748bf310b61b8bab01841e

                                                              • C:\Users\Admin\AppData\Local\Temp\932230532004

                                                                Filesize

                                                                96KB

                                                                MD5

                                                                19b5873da1ece1dad1afab5759e2137e

                                                                SHA1

                                                                13645f286f536e342feb2d507e7be9563dc0ccd7

                                                                SHA256

                                                                b17a93065aeb08aba35197a479b404ff96750c504ec451870fce52351e61fccb

                                                                SHA512

                                                                e3ab49ad265b39576783886f206ed5265c208ad4a87713366243f37a7932a02bf862a620fff68488d2beecfb2ec3aeb9bbae2924b0904fa3ed5bf652faf762d1

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x5zwl1sb.ei1.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                Filesize

                                                                2.8MB

                                                                MD5

                                                                a0c024f437dfac1ab3d4a6baf03c039d

                                                                SHA1

                                                                8012b1cb4296e772c47582e23ffd9a3d1830cdf7

                                                                SHA256

                                                                a2fd808737f2b05bc5ed2149cfd06011fcb8b79fb3a50318b35976ab80dcb97b

                                                                SHA512

                                                                4f27bb42f7ed490795d6b2229e6883da88d6bbac99065cf85bfd2712aa2478b990dcc9b98e179e6794e1a0ccee3b547eb40e34182fef35b21578aa66815ba8c5

                                                              • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                Filesize

                                                                1.6MB

                                                                MD5

                                                                72491c7b87a7c2dd350b727444f13bb4

                                                                SHA1

                                                                1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                SHA256

                                                                34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                SHA512

                                                                583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                Filesize

                                                                458KB

                                                                MD5

                                                                619f7135621b50fd1900ff24aade1524

                                                                SHA1

                                                                6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                SHA256

                                                                344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                SHA512

                                                                2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                              • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                Filesize

                                                                3.3MB

                                                                MD5

                                                                045b0a3d5be6f10ddf19ae6d92dfdd70

                                                                SHA1

                                                                0387715b6681d7097d372cd0005b664f76c933c7

                                                                SHA256

                                                                94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                                SHA512

                                                                58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                              • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                Filesize

                                                                440B

                                                                MD5

                                                                3626532127e3066df98e34c3d56a1869

                                                                SHA1

                                                                5fa7102f02615afde4efd4ed091744e842c63f78

                                                                SHA256

                                                                2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                                SHA512

                                                                dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                Filesize

                                                                479KB

                                                                MD5

                                                                09372174e83dbbf696ee732fd2e875bb

                                                                SHA1

                                                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                SHA256

                                                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                SHA512

                                                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                Filesize

                                                                13.8MB

                                                                MD5

                                                                0a8747a2ac9ac08ae9508f36c6d75692

                                                                SHA1

                                                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                SHA256

                                                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                SHA512

                                                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                              • C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll

                                                                Filesize

                                                                124KB

                                                                MD5

                                                                7fe5b933ed9391ea24647479c80e904e

                                                                SHA1

                                                                963721e46b8056e2e883c598e95d7daa7bdf8d9b

                                                                SHA256

                                                                2e12355cb9b11c923dc06f195399d678bc46680e982856d9405f64e7563fe8b3

                                                                SHA512

                                                                82d92d0c5155fff5ce97099cb9e78422ff328e0c516fbab7634e624215366c2191ec6ff6fe8d939268275c6770accb208af7ac69c3cc13c9188a49ef41339bb0

                                                              • C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\cred64.dll

                                                                Filesize

                                                                1.2MB

                                                                MD5

                                                                d862c12a4467ebae581a8c0cc3ea2211

                                                                SHA1

                                                                9e797375b9b4422b2314d3e372628643ccf1c5db

                                                                SHA256

                                                                47f8a270b27c18bab9013f4a8f0ee6e877e4050bd4018d682eb502bcfd5bff6d

                                                                SHA512

                                                                cf6545df4a244bb7dc699a565759f97c759ba19bcc9ad9ad91a20cd07aee19cbe10eb82dd21416b717581b34dc4f24ba6d43a00e7d8018b8be133dbbc9e8113c

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                99085a651ae19c469eedc0663c57ab70

                                                                SHA1

                                                                a8f69f1470def8f854a799066da4f9b124a043d6

                                                                SHA256

                                                                fb94975ecac3e8e51be571837cf70d4d7c07cce90e4442c7241e27fa19924e47

                                                                SHA512

                                                                b9fc7fae9901f950eb697d511121102891cc0995aeb6da1500a6c0824d5feac39e0d521cd17dc8e21f7902bd9a3514670682261a6b7814519758c699e05b152d

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                                Filesize

                                                                18KB

                                                                MD5

                                                                9d52cb97c42db38a34c348fdf375f8d1

                                                                SHA1

                                                                a40609e26aef36a6f4102d269a964828751f8039

                                                                SHA256

                                                                8ec6aca463643f10f54de6b3070909a50cbd0ca97c44faa25fc65744fa699f91

                                                                SHA512

                                                                8e52b99e3dc8083447dccab7753d34ad8be3f68d9b3a10869aaebcb2a5bf6cf344856902b5abc353fb5d8400674dd742bbf511d5b1f721692dbfb9808f50025d

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                4e97a04d5203648f7382cd81a4f72ba1

                                                                SHA1

                                                                1437a848955da9a920bac3aa976ff6e6cd0e6b94

                                                                SHA256

                                                                cecdcfc701845274e35e5a1c7a509ff39d18ab21d40bdf6dd11a0aa0f9838dd4

                                                                SHA512

                                                                b89f1112c0e036fbffa482e346be6a705f596206f0c4283872cac0bb36a2a9b7df02e0c12c6e989ae4e984926f095ad7c7acf3920d9654a2a9be0848b55bb76b

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                288686a4fb94c0965b08dc107cd44945

                                                                SHA1

                                                                9a9e09a6b425351cd89c986f8cf4e995dfd461fc

                                                                SHA256

                                                                b10037971b49b4746d7cbfdeec6bc85d974bd6958b4f8f7d8c95d964db286df4

                                                                SHA512

                                                                5597a95c032d693814d9762b55208ae6634fb42c8343de4aac9cbd200e1fe26cd82794c65cbafafe490d37c6eb49b7f257263fb2c5acc3d3f47e18b8c4c76a80

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                3a597c59bdbb5db7138019b72209ee1a

                                                                SHA1

                                                                6b4bed52eb554d9175507d19455634d9149888c3

                                                                SHA256

                                                                b712e89746d9a4ebc748f83d8a21d67177ac686e1beb30d2623c8d763068f425

                                                                SHA512

                                                                059d61123b919085eb229721256e3115a7ad8f8740090467dffc18acdd8bdef6ccbef6693d002fdfcf9c150f341350a67d08b0433bd6594069a4dbd929335627

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                7bbc9053479b8e4436a72148678e222d

                                                                SHA1

                                                                f00e1ca938b05f889c34b7cc11d7897da6702e84

                                                                SHA256

                                                                472034e100844eb21ad2cfa50ab65bc179120e7d0e75fc97d41e38373753c776

                                                                SHA512

                                                                d0581a5e7d6412ae84cc22035a253d0900afb688957bdeb0ebd74c0dc3c0bc235bb2850bf9a8d55c50c21ccc9ef1c7c630c0ef9987a558b15d09ef3053abe35b

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                6ffdad88bb9b7a9a5961c3c70ec382f7

                                                                SHA1

                                                                ceafe25f1434294696792b90bda990c44f1def1f

                                                                SHA256

                                                                de591be31050aac6c2650bf80d9e1f0b4628436e439a81b965354da956f9950d

                                                                SHA512

                                                                561a26ffa77eb012812c69f9d9ebd85a2c462a900603c15aca5f207ff19ea72239f919637f00f5a3657e05349fee9247b622104e3c7a8810933894a2cad712c2

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                a71f1c9e6879372167bcb15d62820e47

                                                                SHA1

                                                                fae29ba2e1817c832c704ad592bb57fd7a925596

                                                                SHA256

                                                                58757a5812d923b2d588d39dd1aa1f19bc34faceeecaa33e11923ca4b6dbb60c

                                                                SHA512

                                                                07e01e19114e8f260056239b2ac52a20d19a6310de41fc99cfb187a6dc3aa4ba46782831b9945421ddf0870c5b0821651fc616bc6df44abc90cda6b1e90a622c

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0e17d57a-d1fd-4df8-91a3-104732eeac40

                                                                Filesize

                                                                671B

                                                                MD5

                                                                c1838edf291edaa5bc127124938e249f

                                                                SHA1

                                                                9c009acaa718d7f9b1cd0be60e4afa8f14abe4cb

                                                                SHA256

                                                                2f736468b5a89b0f39732acaee78f17c13a72b34953722f6d4433fb6f970400a

                                                                SHA512

                                                                bb9c91322d85481c4cbfc5d11fac730c149d5f1d53a8b4243ca91eda7af8dff0108804df2bf464bd6e005fe78a7c12d50cc3fdfba8b22a131d22b8d9a266e503

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\c3ebd4a0-3298-4299-8b9d-3ccdabf98805

                                                                Filesize

                                                                26KB

                                                                MD5

                                                                70461dcd17b1fdf91d2072dc91d2849e

                                                                SHA1

                                                                0ac912a911952abaadf27b0cc3139dad8ea431d7

                                                                SHA256

                                                                ec903efbd8ed5dd86e2c5ef9005522d97ef82422662c48677d5a9a43bd2262f6

                                                                SHA512

                                                                ba876f0f86dd362770cccf762026a853ddb34cfc4cfd9886ba4417a8534f3f476eedec9fa149e93dd6e9d0f7c3844387ea834b53a143b4ec28f31c1213dccd13

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\ca4a6be3-06b3-4e17-85b0-8cc5a8bebab2

                                                                Filesize

                                                                982B

                                                                MD5

                                                                7af4ff1898a19a86b1e7c637e9711705

                                                                SHA1

                                                                cb4b97d976a380d63126a8daed88759148f46a9b

                                                                SHA256

                                                                c0b45e332ca18f9c3ca5b0cb14e9e3a1cd701b3b61ea938e5c29462ec011cd2b

                                                                SHA512

                                                                3c436aad5a9e25dbdab1eb8189f725bd7588cbabb6d8668325fcf10f02fa1ae13793a5ce9bd491e3c4b1e30dd8223e0ee08aa58b0945c351665c345ca8f203c9

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                842039753bf41fa5e11b3a1383061a87

                                                                SHA1

                                                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                SHA256

                                                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                SHA512

                                                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                Filesize

                                                                116B

                                                                MD5

                                                                2a461e9eb87fd1955cea740a3444ee7a

                                                                SHA1

                                                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                SHA256

                                                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                SHA512

                                                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                Filesize

                                                                372B

                                                                MD5

                                                                bf957ad58b55f64219ab3f793e374316

                                                                SHA1

                                                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                SHA256

                                                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                SHA512

                                                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                Filesize

                                                                17.8MB

                                                                MD5

                                                                daf7ef3acccab478aaa7d6dc1c60f865

                                                                SHA1

                                                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                SHA256

                                                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                SHA512

                                                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                ff09f29bb6ef8b3ccaf100440969ac85

                                                                SHA1

                                                                c702f665e2867d37a504134dae7efa6dfc688da4

                                                                SHA256

                                                                ea051da2c02d5e7a38ff8423c47e395f775b6b8a84cbd4122f28c14bdc445341

                                                                SHA512

                                                                74017a39a5a43cac134ea45f5eab7d622c587cbe42f48b9615b26b1867f1b0e7d734fb84c1cd86c33f82ea738eff2713b5cecf9aa1b754c1692b3cba6ea3af9f

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                8d7fea487c74717c147ac0c474daee55

                                                                SHA1

                                                                1892e024b8c6e16f09c2e3153474e7220e0ebc36

                                                                SHA256

                                                                611314d65acfeaa9f25ead7284df9e5a3fec911d2cc25381ddb174f99c7f88ff

                                                                SHA512

                                                                07ebc3ba10ec6b8502c5f3317516564ffa1cfa7a1624ab8e05d2f6eea7d390f1bc41433afe14afca87a1f3dcf6bc2046883f235a2b183908af7fd179fa3180dd

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                                Filesize

                                                                14KB

                                                                MD5

                                                                889bde780d5ceb64c5de453ece7eecd7

                                                                SHA1

                                                                245b00662f11c50b0d41799905972979264ca7f1

                                                                SHA256

                                                                3307915f64f1abbab172a2604b35b042fd4be0d490491a3cb4952b5135e5222d

                                                                SHA512

                                                                b730fcb2e4ee1d07dfcb67dd7ebc241fa77b4d1cbd3455b9643703ac1f5d7fb11d70da808abd1e2d5741a85420e357c1505ad1a2168908e25609e66962470709

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                0afe44f1fc50321301c74f8d33ace74c

                                                                SHA1

                                                                0fe85d00ba643615d7c9abb77149a184d7623dea

                                                                SHA256

                                                                89e70331281ce4e5f603eacb127a105756bc9a448aca86be46574fed5cbda582

                                                                SHA512

                                                                48a432b9857528ea89ba6b5fa84b2a2c1309ae505c7d2c6d4fb76a6ceba104976d140e8d3f585812085e0fa0b1488b03b7c81b5e56df5a8fd3a11cc76b4f9fc8

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                Filesize

                                                                2.4MB

                                                                MD5

                                                                df8f0a72e4db603fa0506dd6f0938b1f

                                                                SHA1

                                                                9f635aa44efdf3e297f3a8128dec63975a6649df

                                                                SHA256

                                                                140f84c9c29151048f89e6c784f475d62b3aecc109efa47eaae65f28c23f3b53

                                                                SHA512

                                                                0e46ad61ea48574fcc36adc8bbd1eb4787a4a6773bcf105193de82ba0ca8740ab667b5429b13528a0981f86f00434ee6b540abb44afdbc9044062dab6a63ad46

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                Filesize

                                                                9.5MB

                                                                MD5

                                                                359f61741b1c9f24b7a5186817115c91

                                                                SHA1

                                                                52fa0304d2c6a3b493f1e257b31d624254f48114

                                                                SHA256

                                                                32b9a3c68eb6ee4ddd6b398b42d1837be5394f30d671316619788ee7f78c2619

                                                                SHA512

                                                                1e61ae164aa1f47f434cff2ae9c3de9749290da08822666fcd1ad4b9c6364c11f9c5bce3b38d23921f8d5711995acf3346a608da124efae14319c631b5bb9592

                                                              • C:\Users\Public\Netstat\FuturreApp.exe

                                                                Filesize

                                                                103KB

                                                                MD5

                                                                8d9709ff7d9c83bd376e01912c734f0a

                                                                SHA1

                                                                e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294

                                                                SHA256

                                                                49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3

                                                                SHA512

                                                                042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee

                                                              • C:\Users\Public\Netstat\HTCTL32.DLL

                                                                Filesize

                                                                320KB

                                                                MD5

                                                                2d3b207c8a48148296156e5725426c7f

                                                                SHA1

                                                                ad464eb7cf5c19c8a443ab5b590440b32dbc618f

                                                                SHA256

                                                                edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

                                                                SHA512

                                                                55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

                                                              • C:\Users\Public\Netstat\NSM.LIC

                                                                Filesize

                                                                257B

                                                                MD5

                                                                7067af414215ee4c50bfcd3ea43c84f0

                                                                SHA1

                                                                c331d410672477844a4ca87f43a14e643c863af9

                                                                SHA256

                                                                2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12

                                                                SHA512

                                                                17b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f

                                                              • C:\Users\Public\Netstat\PCICHEK.DLL

                                                                Filesize

                                                                18KB

                                                                MD5

                                                                a0b9388c5f18e27266a31f8c5765b263

                                                                SHA1

                                                                906f7e94f841d464d4da144f7c858fa2160e36db

                                                                SHA256

                                                                313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

                                                                SHA512

                                                                6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

                                                              • C:\Users\Public\Netstat\PCICL32.dll

                                                                Filesize

                                                                3.6MB

                                                                MD5

                                                                00587238d16012152c2e951a087f2cc9

                                                                SHA1

                                                                c4e27a43075ce993ff6bb033360af386b2fc58ff

                                                                SHA256

                                                                63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8

                                                                SHA512

                                                                637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226

                                                              • C:\Users\Public\Netstat\client32.ini

                                                                Filesize

                                                                702B

                                                                MD5

                                                                a4aa9219becdeec09159270bb041bb35

                                                                SHA1

                                                                2d08305017efb0a1ff7defdf66db80191ed9ccf8

                                                                SHA256

                                                                277b9bcb5778cd5dc167ed75528818b06ed12f3fd427339f3085f4db8a39ed2e

                                                                SHA512

                                                                4f7ce001da009fcba0c5beab572a16306d56fd91253c45d5196892142da78ec805982a4e1c136ad61471b5a951697eed76f9ee63d8b94eb64024a11e0fd0de42

                                                              • C:\Users\Public\Netstat\msvcr100.dll

                                                                Filesize

                                                                755KB

                                                                MD5

                                                                0e37fbfa79d349d672456923ec5fbbe3

                                                                SHA1

                                                                4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                                SHA256

                                                                8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                                SHA512

                                                                2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                              • C:\Users\Public\Netstat\pcicapi.dll

                                                                Filesize

                                                                32KB

                                                                MD5

                                                                dcde2248d19c778a41aa165866dd52d0

                                                                SHA1

                                                                7ec84be84fe23f0b0093b647538737e1f19ebb03

                                                                SHA256

                                                                9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

                                                                SHA512

                                                                c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

                                                              • memory/860-27-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/860-29-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/860-26-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/860-25-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/1200-248-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                Filesize

                                                                972KB

                                                              • memory/1200-1340-0x0000000000310000-0x0000000000803000-memory.dmp

                                                                Filesize

                                                                4.9MB

                                                              • memory/1200-1190-0x0000000000310000-0x0000000000803000-memory.dmp

                                                                Filesize

                                                                4.9MB

                                                              • memory/1200-769-0x0000000000310000-0x0000000000803000-memory.dmp

                                                                Filesize

                                                                4.9MB

                                                              • memory/1200-621-0x0000000000310000-0x0000000000803000-memory.dmp

                                                                Filesize

                                                                4.9MB

                                                              • memory/1200-573-0x0000000000310000-0x0000000000803000-memory.dmp

                                                                Filesize

                                                                4.9MB

                                                              • memory/1200-228-0x0000000000310000-0x0000000000803000-memory.dmp

                                                                Filesize

                                                                4.9MB

                                                              • memory/1748-116-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                Filesize

                                                                336KB

                                                              • memory/1748-114-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                Filesize

                                                                336KB

                                                              • memory/2424-742-0x0000000000300000-0x00000000005BE000-memory.dmp

                                                                Filesize

                                                                2.7MB

                                                              • memory/2424-303-0x0000000000300000-0x00000000005BE000-memory.dmp

                                                                Filesize

                                                                2.7MB

                                                              • memory/2424-311-0x0000000000300000-0x00000000005BE000-memory.dmp

                                                                Filesize

                                                                2.7MB

                                                              • memory/2424-310-0x0000000000300000-0x00000000005BE000-memory.dmp

                                                                Filesize

                                                                2.7MB

                                                              • memory/2424-728-0x0000000000300000-0x00000000005BE000-memory.dmp

                                                                Filesize

                                                                2.7MB

                                                              • memory/3636-194-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                Filesize

                                                                344KB

                                                              • memory/3636-192-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                Filesize

                                                                344KB

                                                              • memory/3948-210-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/3948-212-0x0000000000CD0000-0x000000000117B000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/4068-1039-0x00007FF6B8910000-0x00007FF6B8DA0000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/4068-1036-0x00007FF6B8910000-0x00007FF6B8DA0000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/4628-1743-0x0000000000E70000-0x0000000001ADC000-memory.dmp

                                                                Filesize

                                                                12.4MB

                                                              • memory/4628-1649-0x0000000000E70000-0x0000000001ADC000-memory.dmp

                                                                Filesize

                                                                12.4MB

                                                              • memory/4628-2248-0x0000000000E70000-0x0000000001ADC000-memory.dmp

                                                                Filesize

                                                                12.4MB

                                                              • memory/4628-1222-0x0000000000E70000-0x0000000001ADC000-memory.dmp

                                                                Filesize

                                                                12.4MB

                                                              • memory/4636-3739-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-1198-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-229-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-3756-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-16-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-46-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-176-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-3170-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-2237-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-620-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-821-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-1608-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-19-0x0000000000841000-0x000000000086F000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/4636-20-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-117-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-21-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-22-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-24-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4636-30-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4760-0-0x0000000000BD0000-0x0000000000EDC000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4760-4-0x0000000000BD0000-0x0000000000EDC000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4760-1-0x0000000077694000-0x0000000077696000-memory.dmp

                                                                Filesize

                                                                8KB

                                                              • memory/4760-2-0x0000000000BD1000-0x0000000000BFF000-memory.dmp

                                                                Filesize

                                                                184KB

                                                              • memory/4760-18-0x0000000000BD0000-0x0000000000EDC000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4760-3-0x0000000000BD0000-0x0000000000EDC000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/4948-1471-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1392-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1470-0x0000000001230000-0x0000000001250000-memory.dmp

                                                                Filesize

                                                                128KB

                                                              • memory/4948-1469-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1408-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1402-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1547-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1405-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1401-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1411-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1404-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/4948-1409-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                Filesize

                                                                7.4MB

                                                              • memory/5024-155-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                Filesize

                                                                348KB

                                                              • memory/5024-153-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                Filesize

                                                                348KB

                                                              • memory/5852-1108-0x000001C742AA0000-0x000001C742AC2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/5968-1323-0x00000000000D0000-0x00000000003E8000-memory.dmp

                                                                Filesize

                                                                3.1MB

                                                              • memory/5968-1294-0x00000000000D0000-0x00000000003E8000-memory.dmp

                                                                Filesize

                                                                3.1MB

                                                              • memory/6000-2566-0x0000016982210000-0x000001698221A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/6000-2565-0x000001699A7B0000-0x000001699A7C2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/6024-689-0x0000000000D80000-0x0000000001218000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6024-683-0x0000000000D80000-0x0000000001218000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6032-3650-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                                Filesize

                                                                8.4MB

                                                              • memory/6032-2706-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                                Filesize

                                                                8.4MB

                                                              • memory/6032-2707-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                                Filesize

                                                                8.4MB

                                                              • memory/6032-1959-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                                Filesize

                                                                8.4MB

                                                              • memory/6032-3745-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                                Filesize

                                                                8.4MB

                                                              • memory/6032-3753-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                                Filesize

                                                                8.4MB

                                                              • memory/6032-2223-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                Filesize

                                                                112KB

                                                              • memory/6248-1332-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/6248-1305-0x0000000000840000-0x0000000000B4C000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/6368-1524-0x00007FF64A8E0000-0x00007FF64AD70000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6368-1391-0x00007FF64A8E0000-0x00007FF64AD70000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/6648-1657-0x0000000000600000-0x0000000001270000-memory.dmp

                                                                Filesize

                                                                12.4MB

                                                              • memory/6648-1667-0x0000000000600000-0x0000000001270000-memory.dmp

                                                                Filesize

                                                                12.4MB