Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 07:38

General

  • Target

    2dda1d7131936af8aed1469de82e7570144b61ac0f74c348e8e04dff174dbc5d.exe

  • Size

    3.5MB

  • MD5

    20ba2b70fa89d384036206dd86acd5b4

  • SHA1

    652574c76295c7fc1172cd135d1c076e56419a4c

  • SHA256

    2dda1d7131936af8aed1469de82e7570144b61ac0f74c348e8e04dff174dbc5d

  • SHA512

    ec6320825f03c271014f0b4e4c5d9b6ffdcd3645bc798b80059110f96798c20026726662a63c00832851f2c9c19f41dfd2a3c5ba9070631e25e0872dd08af8cf

  • SSDEEP

    98304:a8IKl7r9eIEXUhgvKdURyrhsKa4Q98yUVLcfY:aKQL2LaF98j+w

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

cryptbot

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 6 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 14 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dda1d7131936af8aed1469de82e7570144b61ac0f74c348e8e04dff174dbc5d.exe
    "C:\Users\Admin\AppData\Local\Temp\2dda1d7131936af8aed1469de82e7570144b61ac0f74c348e8e04dff174dbc5d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1d52N9.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1d52N9.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4008
        • C:\Users\Admin\AppData\Local\Temp\1019988001\de806205b9.exe
          "C:\Users\Admin\AppData\Local\Temp\1019988001\de806205b9.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2312
            • C:\Windows\system32\mode.com
              mode 65,10
              6⤵
                PID:3964
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1136
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_7.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:432
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_6.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:4464
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_5.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:3296
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_4.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1328
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_3.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:3364
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_2.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:2476
              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                7z.exe e extracted/file_1.zip -oextracted
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:2956
              • C:\Windows\system32\attrib.exe
                attrib +H "in.exe"
                6⤵
                • Views/modifies file attributes
                PID:4836
              • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                "in.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3616
                • C:\Windows\SYSTEM32\attrib.exe
                  attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                  7⤵
                  • Views/modifies file attributes
                  PID:3724
                • C:\Windows\SYSTEM32\attrib.exe
                  attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                  7⤵
                  • Views/modifies file attributes
                  PID:3956
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                  7⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:4788
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell ping 127.0.0.1; del in.exe
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2988
                  • C:\Windows\system32\PING.EXE
                    "C:\Windows\system32\PING.EXE" 127.0.0.1
                    8⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2236
          • C:\Users\Admin\AppData\Local\Temp\1019989001\dd4b42907f.exe
            "C:\Users\Admin\AppData\Local\Temp\1019989001\dd4b42907f.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5016
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1508
              5⤵
              • Program crash
              PID:4872
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1540
              5⤵
              • Program crash
              PID:4752
          • C:\Users\Admin\AppData\Local\Temp\1019990001\f85d6dde45.exe
            "C:\Users\Admin\AppData\Local\Temp\1019990001\f85d6dde45.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:448
            • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4340
          • C:\Users\Admin\AppData\Local\Temp\1019991001\3e9f9bb10d.exe
            "C:\Users\Admin\AppData\Local\Temp\1019991001\3e9f9bb10d.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2496
            • C:\Program Files\Windows Media Player\graph\graph.exe
              "C:\Program Files\Windows Media Player\graph\graph.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4616
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --load-extension=""
                6⤵
                • Enumerates system info in registry
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:3724
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7fffcc92cc40,0x7fffcc92cc4c,0x7fffcc92cc58
                  7⤵
                    PID:1768
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2424,i,11142305526984948411,5982456360069208722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2440 /prefetch:2
                    7⤵
                      PID:540
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,11142305526984948411,5982456360069208722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2540 /prefetch:3
                      7⤵
                        PID:3364
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2004,i,11142305526984948411,5982456360069208722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2648 /prefetch:8
                        7⤵
                          PID:1532
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11142305526984948411,5982456360069208722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:1
                          7⤵
                            PID:3904
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,11142305526984948411,5982456360069208722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:1
                            7⤵
                              PID:1852
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3724,i,11142305526984948411,5982456360069208722,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3700 /prefetch:1
                              7⤵
                                PID:4300
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --load-extension=""
                              6⤵
                              • Enumerates system info in registry
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SendNotifyMessage
                              PID:6376
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7fffcc92cc40,0x7fffcc92cc4c,0x7fffcc92cc58
                                7⤵
                                  PID:6408
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2344,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2336 /prefetch:2
                                  7⤵
                                    PID:6612
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:3
                                    7⤵
                                      PID:6624
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2016,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2692 /prefetch:8
                                      7⤵
                                        PID:6628
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                                        7⤵
                                          PID:6792
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:1
                                          7⤵
                                            PID:6808
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:1
                                            7⤵
                                              PID:6960
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4848,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:8
                                              7⤵
                                                PID:5856
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:8
                                                7⤵
                                                  PID:5952
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5088,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:8
                                                  7⤵
                                                    PID:4428
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4984,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:8
                                                    7⤵
                                                      PID:5164
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4696 /prefetch:8
                                                      7⤵
                                                        PID:3864
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5464 /prefetch:8
                                                        7⤵
                                                          PID:5388
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5388,i,5759458937216067736,12071018390564067225,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5004 /prefetch:2
                                                          7⤵
                                                            PID:4696
                                                    • C:\Users\Admin\AppData\Local\Temp\1019992001\54a6942107.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019992001\54a6942107.exe"
                                                      4⤵
                                                      • Enumerates VirtualBox registry keys
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3048
                                                    • C:\Users\Admin\AppData\Local\Temp\1019993001\8056f2b8a7.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019993001\8056f2b8a7.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3056
                                                    • C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4204
                                                      • C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        PID:1724
                                                      • C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4380
                                                    • C:\Users\Admin\AppData\Local\Temp\1019995001\188e3f93be.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019995001\188e3f93be.exe"
                                                      4⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2300
                                                    • C:\Users\Admin\AppData\Local\Temp\1019996001\aee4a8b7f4.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019996001\aee4a8b7f4.exe"
                                                      4⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5044
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 780
                                                        5⤵
                                                        • Program crash
                                                        PID:7992
                                                    • C:\Users\Admin\AppData\Local\Temp\1019997001\f30995d76a.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019997001\f30995d76a.exe"
                                                      4⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4856
                                                    • C:\Users\Admin\AppData\Local\Temp\1019998001\65fd7c7d02.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1019998001\65fd7c7d02.exe"
                                                      4⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Loads dropped DLL
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      PID:4204
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        • Enumerates system info in registry
                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                        • Suspicious use of FindShellTrayWindow
                                                        PID:4972
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7fffcc92cc40,0x7fffcc92cc4c,0x7fffcc92cc58
                                                          6⤵
                                                            PID:1688
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,4189029113540675711,14307878824895098841,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:2
                                                            6⤵
                                                              PID:3340
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,4189029113540675711,14307878824895098841,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:3
                                                              6⤵
                                                                PID:2956
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,4189029113540675711,14307878824895098841,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:8
                                                                6⤵
                                                                  PID:4748
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,4189029113540675711,14307878824895098841,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                                                                  6⤵
                                                                  • Uses browser remote debugging
                                                                  PID:3920
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,4189029113540675711,14307878824895098841,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3356 /prefetch:1
                                                                  6⤵
                                                                  • Uses browser remote debugging
                                                                  PID:4816
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                5⤵
                                                                • Uses browser remote debugging
                                                                • Enumerates system info in registry
                                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                PID:7192
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7fffc6e946f8,0x7fffc6e94708,0x7fffc6e94718
                                                                  6⤵
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  PID:7204
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
                                                                  6⤵
                                                                    PID:7476
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
                                                                    6⤵
                                                                      PID:7464
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:8
                                                                      6⤵
                                                                        PID:7500
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:1
                                                                        6⤵
                                                                        • Uses browser remote debugging
                                                                        PID:7740
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:1
                                                                        6⤵
                                                                        • Uses browser remote debugging
                                                                        PID:7748
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3368 /prefetch:2
                                                                        6⤵
                                                                          PID:7756
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3368 /prefetch:2
                                                                          6⤵
                                                                            PID:7884
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3956 /prefetch:2
                                                                            6⤵
                                                                              PID:8108
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3736 /prefetch:2
                                                                              6⤵
                                                                                PID:8132
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3980 /prefetch:2
                                                                                6⤵
                                                                                  PID:8020
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3612 /prefetch:2
                                                                                  6⤵
                                                                                    PID:7976
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4052 /prefetch:2
                                                                                    6⤵
                                                                                      PID:7940
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6929914590722985162,1102485406536608615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4416 /prefetch:2
                                                                                      6⤵
                                                                                        PID:3304
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 2512
                                                                                      5⤵
                                                                                      • Program crash
                                                                                      PID:2768
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1019999001\77fa187db6.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1019999001\77fa187db6.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:2248
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM firefox.exe /T
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:996
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM chrome.exe /T
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3720
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM msedge.exe /T
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3592
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM opera.exe /T
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3048
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM brave.exe /T
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4016
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                      5⤵
                                                                                        PID:964
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                          6⤵
                                                                                          • Checks processor information in registry
                                                                                          • Modifies registry class
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:832
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a15b3142-82c4-4917-abf5-b7c5618bdc5c} 832 "\\.\pipe\gecko-crash-server-pipe.832" gpu
                                                                                            7⤵
                                                                                              PID:1464
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f21da3b-842f-4d82-b18f-779ebf1276d7} 832 "\\.\pipe\gecko-crash-server-pipe.832" socket
                                                                                              7⤵
                                                                                                PID:2460
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1468 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 3012 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1745ba3-0960-44de-9cca-746f0c32d903} 832 "\\.\pipe\gecko-crash-server-pipe.832" tab
                                                                                                7⤵
                                                                                                  PID:5216
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3744 -childID 2 -isForBrowser -prefsHandle 3732 -prefMapHandle 3740 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f837d37-9f07-42cb-a6c9-88a440c41c9b} 832 "\\.\pipe\gecko-crash-server-pipe.832" tab
                                                                                                  7⤵
                                                                                                    PID:5372
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4704 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4776 -prefMapHandle 4772 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e33d4a60-157b-4890-9593-c8ac1fbef39c} 832 "\\.\pipe\gecko-crash-server-pipe.832" utility
                                                                                                    7⤵
                                                                                                    • Checks processor information in registry
                                                                                                    PID:6652
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3892 -childID 3 -isForBrowser -prefsHandle 5168 -prefMapHandle 5212 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47d493ea-869e-4f9a-99e1-9e82e74ea732} 832 "\\.\pipe\gecko-crash-server-pipe.832" tab
                                                                                                    7⤵
                                                                                                      PID:8028
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5408 -childID 4 -isForBrowser -prefsHandle 5488 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6445af50-280b-4358-8c47-d2b31ea837bd} 832 "\\.\pipe\gecko-crash-server-pipe.832" tab
                                                                                                      7⤵
                                                                                                        PID:8156
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4956 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5684 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1328 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85f88f59-37db-4971-84d5-e5206e790dfe} 832 "\\.\pipe\gecko-crash-server-pipe.832" tab
                                                                                                        7⤵
                                                                                                          PID:5292
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1020000001\219a708879.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\1020000001\219a708879.exe"
                                                                                                    4⤵
                                                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                    • Checks BIOS information in registry
                                                                                                    • Executes dropped EXE
                                                                                                    • Identifies Wine through registry keys
                                                                                                    • Windows security modification
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:7796
                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2z9698.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2z9698.exe
                                                                                                2⤵
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Executes dropped EXE
                                                                                                • Identifies Wine through registry keys
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:4828
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5016 -ip 5016
                                                                                              1⤵
                                                                                                PID:3020
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5016 -ip 5016
                                                                                                1⤵
                                                                                                  PID:3908
                                                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                  1⤵
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:3864
                                                                                                • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1152
                                                                                                • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                  C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:3308
                                                                                                  • C:\Windows\explorer.exe
                                                                                                    explorer.exe
                                                                                                    2⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2708
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                                                    2⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5020
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                                      3⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:1328
                                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                  1⤵
                                                                                                    PID:824
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                    1⤵
                                                                                                      PID:6012
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5044 -ip 5044
                                                                                                      1⤵
                                                                                                        PID:8148
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4204 -ip 4204
                                                                                                        1⤵
                                                                                                          PID:7884
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                          1⤵
                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                          • Checks BIOS information in registry
                                                                                                          • Executes dropped EXE
                                                                                                          • Identifies Wine through registry keys
                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                          PID:4428
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                                                                          1⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:3932
                                                                                                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                          1⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          PID:4296
                                                                                                          • C:\Windows\explorer.exe
                                                                                                            explorer.exe
                                                                                                            2⤵
                                                                                                              PID:4264
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                                                                              2⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:2408
                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                                                                                3⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                • Runs ping.exe
                                                                                                                PID:5756

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Program Files\Windows Media Player\graph\graph.exe

                                                                                                            Filesize

                                                                                                            245KB

                                                                                                            MD5

                                                                                                            7d254439af7b1caaa765420bea7fbd3f

                                                                                                            SHA1

                                                                                                            7bd1d979de4a86cb0d8c2ad9e1945bd351339ad0

                                                                                                            SHA256

                                                                                                            d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394

                                                                                                            SHA512

                                                                                                            c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc

                                                                                                          • C:\ProgramData\mozglue.dll

                                                                                                            Filesize

                                                                                                            593KB

                                                                                                            MD5

                                                                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                                                                            SHA1

                                                                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                            SHA256

                                                                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                            SHA512

                                                                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            40B

                                                                                                            MD5

                                                                                                            b65d667045a646269e3eb65f457698f1

                                                                                                            SHA1

                                                                                                            a263ce582c0157238655530107dbec05a3475c54

                                                                                                            SHA256

                                                                                                            23848757826358c47263fa65d53bb5ec49286b717f7f2c9c8e83192a39e35bb6

                                                                                                            SHA512

                                                                                                            87f10412feee145f16f790fbbcf0353db1b0097bda352c2cd147028db69a1e98779be880e133fed17af6ed73eb615a51e5616966c8a7b7de364ec75f37c67567

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\467ea7ca-1e9a-4f02-9bac-c6ad59f8f5da.tmp

                                                                                                            Filesize

                                                                                                            1B

                                                                                                            MD5

                                                                                                            5058f1af8388633f609cadb75a75dc9d

                                                                                                            SHA1

                                                                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                            SHA256

                                                                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                            SHA512

                                                                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                            Filesize

                                                                                                            649B

                                                                                                            MD5

                                                                                                            d05eb96ce084ca7090cd230e203c71c6

                                                                                                            SHA1

                                                                                                            ccaa6710d701cc0520ee656d70b37c6ce3938d69

                                                                                                            SHA256

                                                                                                            f96aefa2f51ab076ea3b660623a13b3f87eb770fb6b6500638c2cf72dd6a5ad4

                                                                                                            SHA512

                                                                                                            f3b3b470bd8df0d7d522940d92411ca511dbabb2d19649b88a03fa0f36f190d509ce60e433c04d81dac7195d40cfd30618ade28e9f854b23d5e1dabf64bb436c

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                                                                            Filesize

                                                                                                            851B

                                                                                                            MD5

                                                                                                            07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                            SHA1

                                                                                                            6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                            SHA256

                                                                                                            6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                            SHA512

                                                                                                            7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                                                                            Filesize

                                                                                                            854B

                                                                                                            MD5

                                                                                                            4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                            SHA1

                                                                                                            fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                            SHA256

                                                                                                            6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                            SHA512

                                                                                                            939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                            Filesize

                                                                                                            2B

                                                                                                            MD5

                                                                                                            d751713988987e9331980363e24189ce

                                                                                                            SHA1

                                                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                            SHA256

                                                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                            SHA512

                                                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                            Filesize

                                                                                                            356B

                                                                                                            MD5

                                                                                                            7f086687eb8c905d35dac270aa996a05

                                                                                                            SHA1

                                                                                                            84531b2c831888b2863e9d0686bbb542ed4451a7

                                                                                                            SHA256

                                                                                                            dc90e3f479edd5410d108b2996b34a8ca989049085cc49477407e2f5d41e0c95

                                                                                                            SHA512

                                                                                                            15170a778a3a9ea733e6badceaa82619e06134549394b70e47c44e6c3efde1bde68467bc3f9519ec5bb7e2a3c053ecb3b12153691db7b2c002f331451804e5af

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            20d08f55563ab6ee937eb4a829b0d5f6

                                                                                                            SHA1

                                                                                                            912cb31a3cb129562cdcdc7bbfe30e0bb706b7f0

                                                                                                            SHA256

                                                                                                            be67a63c8b568fe1e48bc3a32ba32d0ca53c5da8ae766a36b81e7e03a346ba17

                                                                                                            SHA512

                                                                                                            8640b289970b86d7e683f9514da3fea142d560adabf372c710117026fae875de801109786e24bec0d04f1317416fe9036364fcaf7f49546c86b83d0d0aab34ac

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            f43f87ccab34a09b722025710412185c

                                                                                                            SHA1

                                                                                                            29ce226bde3494a10eef783a85d43537b1e24ef8

                                                                                                            SHA256

                                                                                                            c3938980325dea20ac4e0fffd0e1e36ab33eea9471a97139f1a54b70270a207c

                                                                                                            SHA512

                                                                                                            b3b5d2cd47688756512a48435748b5a1abf2c26d88a3bd04dd7f481795bf079806624a576abe2e7c2a95ad48e7648d99999bb0f711346414552abe77383e0fb1

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            76aa4e45b55373c7921d1990907cffa6

                                                                                                            SHA1

                                                                                                            2f2e704a5fc24f5a7557dfdc7b84053eb66b92f8

                                                                                                            SHA256

                                                                                                            51f63e0491b74f213d02d9094a6c23165513fb77ef83a5197f09ab035ff75c97

                                                                                                            SHA512

                                                                                                            346e4b1113827211503e5576dd135f3c4cc4c54981ad9459daa46f6424ea6f9ce0a9d0e56b93f9f52d3005fb7beb4b8f18aabc427554e8992b88bb408d0e97c1

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            f932ec819aaed92dd9ee720bd6f32c82

                                                                                                            SHA1

                                                                                                            8795ce76fd09d01bbbda5e0ec2d724198d321d82

                                                                                                            SHA256

                                                                                                            9b086958fcf248bbfe25def41d666be5b0e95f2bb792183576556f1439fdafc1

                                                                                                            SHA512

                                                                                                            3eec767e2f1520c258f3e8a081f014a704d4c83f76306428cd8a660ba3a0c8c3cdfe60af16f534d430273f420813bf98419dc38fa3e1bfb36f8326df5a371f39

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            72B

                                                                                                            MD5

                                                                                                            2543c80b1e5c8536967037256c3e1274

                                                                                                            SHA1

                                                                                                            07e703d8c3b7d96fcb89f675d54c831dabf35020

                                                                                                            SHA256

                                                                                                            d3de5937d0783dda17b4eb3a5d0c65ba0801250a4c6518798c04431c0b4016d6

                                                                                                            SHA512

                                                                                                            e3b0bed4791f402a37be7e8b9836a9e50d3e03a7725bd5f880710cd5017d569eb39210bbadc47801cefd352a49af9f31c7abce8acd39cc7348e339bf3d6e48c0

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                            Filesize

                                                                                                            231KB

                                                                                                            MD5

                                                                                                            6a91a390d261afa29806bd3b179a861b

                                                                                                            SHA1

                                                                                                            15ab5169d0d0ce1b4616c21f94c97df695eac9ab

                                                                                                            SHA256

                                                                                                            7564661b67223e782e83122e7097cf21a00b5c20716a83e5d923cee737a65a50

                                                                                                            SHA512

                                                                                                            fa05f5b6513d62f7bfc003829e0b0e7ce90f223f7ea7969f1cdeddac0255cf198c34c346f23d7e222ba91f8d79ef89acd9b66263d05c79e9196c4fe3afc0bd17

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                            Filesize

                                                                                                            231KB

                                                                                                            MD5

                                                                                                            0b2bac86eefabc58153ceb3c21d41a39

                                                                                                            SHA1

                                                                                                            63fa05dea991f62ec64dff07004bc7f8064658d8

                                                                                                            SHA256

                                                                                                            2e65c489d9ea019558b30b72ac04ecb137743b103471d24b34e33456e2a9c1a6

                                                                                                            SHA512

                                                                                                            02955edf50e6858c6a86d92d4ad9078cc4ac7a2ac30cabd7b5639de202b893964bc9c01de4fd82d5d9fd72dc561734a04d3aec6272ae942689edad662c52618d

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            6cf293cb4d80be23433eecf74ddb5503

                                                                                                            SHA1

                                                                                                            24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                            SHA256

                                                                                                            b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                            SHA512

                                                                                                            0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                            Filesize

                                                                                                            150B

                                                                                                            MD5

                                                                                                            d3811a15436c75caf05e86c8673daf07

                                                                                                            SHA1

                                                                                                            a48b90564c27a9e7125244443b8e3e6b1a64e8d1

                                                                                                            SHA256

                                                                                                            eb6579a139537c23770eca95e93c550d4b8ada294b9a59c0dc84335d4977a7c4

                                                                                                            SHA512

                                                                                                            6f2ab9f043f4856af51a762d68f8afbe38e58489805a8791d555c5879e9fbb02d1725180d4753da1fbee251500c8ea9dcf82596c2b8c4900d1389218549c2bdb

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\80eed4e9-045f-49d8-a74c-4d1883a65e4c.dmp

                                                                                                            Filesize

                                                                                                            10.5MB

                                                                                                            MD5

                                                                                                            29da373a17990df14a5d915f66a97aae

                                                                                                            SHA1

                                                                                                            d231caa21be6063614d1b07f312b4d6df37b2ffb

                                                                                                            SHA256

                                                                                                            d2970cdf968556779856fbb1436b6a5e27b136123b0f34979771d647db310ec4

                                                                                                            SHA512

                                                                                                            013eee6b03cdc13e19f11a3931228dd1b065d744e9364b1b94dd98363990817e2975e16b72b9f92aabec7aed3a93ec2522b96ce7e72eb24983143e08cfcefc56

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            152B

                                                                                                            MD5

                                                                                                            f426165d1e5f7df1b7a3758c306cd4ae

                                                                                                            SHA1

                                                                                                            59ef728fbbb5c4197600f61daec48556fec651c1

                                                                                                            SHA256

                                                                                                            b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                                                                                            SHA512

                                                                                                            8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            152B

                                                                                                            MD5

                                                                                                            6960857d16aadfa79d36df8ebbf0e423

                                                                                                            SHA1

                                                                                                            e1db43bd478274366621a8c6497e270d46c6ed4f

                                                                                                            SHA256

                                                                                                            f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                                                                                            SHA512

                                                                                                            6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            348a3397eb021687f8b70c34a20febe9

                                                                                                            SHA1

                                                                                                            d31504464eaefea22ce382c7f4d72026e5962803

                                                                                                            SHA256

                                                                                                            a9705213c26c74d6369f51467927ee8d849b4960366532524f07afe0675a1ce3

                                                                                                            SHA512

                                                                                                            f331a22d1b9a424d8638b4799d885d23dae22cceb98e2cb6099548d728fbfffa157d4c402c8eb4520f8f00c7c4c6adc84c18a63d1f77ec3bcb46a5056c9a6e8e

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                            Filesize

                                                                                                            264KB

                                                                                                            MD5

                                                                                                            f50f89a0a91564d0b8a211f8921aa7de

                                                                                                            SHA1

                                                                                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                            SHA256

                                                                                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                            SHA512

                                                                                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TRPPE7V2\download[1].htm

                                                                                                            Filesize

                                                                                                            1B

                                                                                                            MD5

                                                                                                            cfcd208495d565ef66e7dff9f98764da

                                                                                                            SHA1

                                                                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                            SHA256

                                                                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                            SHA512

                                                                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            548dd08570d121a65e82abb7171cae1c

                                                                                                            SHA1

                                                                                                            1a1b5084b3a78f3acd0d811cc79dbcac121217ab

                                                                                                            SHA256

                                                                                                            cdf17b8532ebcebac3cfe23954a30aa32edd268d040da79c82687e4ccb044adc

                                                                                                            SHA512

                                                                                                            37b98b09178b51eec9599af90d027d2f1028202efc1633047e16e41f1a95610984af5620baac07db085ccfcb96942aafffad17aa1f44f63233e83869dc9f697b

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                            Filesize

                                                                                                            24KB

                                                                                                            MD5

                                                                                                            c1253ec1c495d822b52286a706de2c6b

                                                                                                            SHA1

                                                                                                            a254a13481a591cdddb6dd565dedf66356ffd180

                                                                                                            SHA256

                                                                                                            475622a09942cfefc06138d1f6c2adf22542be7fd6c9a4d3e4bab3405bc7953e

                                                                                                            SHA512

                                                                                                            fb71cd2d13f59caf432ed7e422c5dad621293b9b0a4b55b7b03c920c300eedc59857587edee30cdf38c04819a9a5423cb4b3465e17e966f52ffae43d6bef1828

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31

                                                                                                            Filesize

                                                                                                            13KB

                                                                                                            MD5

                                                                                                            6c3dfe632420596c33e5e3ac7ba83585

                                                                                                            SHA1

                                                                                                            bec4a9296218f27588744f404580f2a3744535b2

                                                                                                            SHA256

                                                                                                            735b5576918a48098b30374f088f984c6e705b34659e12b312fc85567a32040a

                                                                                                            SHA512

                                                                                                            635a544b7a19f0e177ab45d0b45a7d4c9de4895836fb1a2f93c890b318c8271ac4cecb8932294a4166cfd8a24c042631e548332b6a2a1886f4391ae0e774313e

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                                                            Filesize

                                                                                                            13KB

                                                                                                            MD5

                                                                                                            a7e859413250fabad21ff23146c0817e

                                                                                                            SHA1

                                                                                                            e9c420f4b3c8044bcc2c40ec0669e2b4439bee80

                                                                                                            SHA256

                                                                                                            38e1a29bc6fecb0f39f0c266a873931de0eec2867ca6f52345fe677c7fd55f65

                                                                                                            SHA512

                                                                                                            7f162e78ea65e51aff935af73644c752f335b0ef96b074d3b54845f0eb16d5e179ae53cde812de10191b2eadbb924b276dd1d9d1c60770f28b3445c72bd02147

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            a66616016da52b55af02f5f0cc439ffe

                                                                                                            SHA1

                                                                                                            fc821b1e904f7a8fc84b230e2099d7f1352a95e4

                                                                                                            SHA256

                                                                                                            9af6f1b755ba623d0863547e5d6374c72c225f4b534a95684ecf29ae9181cdd9

                                                                                                            SHA512

                                                                                                            2b1b1d3419051effc69bcab6f8a1a489319112159422e6ff7c0e80b6bd3e926cbb20300004e4c9d2d958a0526fda4f6d349ef966c2a754200abf5bac36787b7b

                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                            SHA1

                                                                                                            6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                            SHA256

                                                                                                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                            SHA512

                                                                                                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019988001\de806205b9.exe

                                                                                                            Filesize

                                                                                                            4.2MB

                                                                                                            MD5

                                                                                                            3a425626cbd40345f5b8dddd6b2b9efa

                                                                                                            SHA1

                                                                                                            7b50e108e293e54c15dce816552356f424eea97a

                                                                                                            SHA256

                                                                                                            ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                                                            SHA512

                                                                                                            a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019989001\dd4b42907f.exe

                                                                                                            Filesize

                                                                                                            1.8MB

                                                                                                            MD5

                                                                                                            15709eba2afaf7cc0a86ce0abf8e53f1

                                                                                                            SHA1

                                                                                                            238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                                                                                                            SHA256

                                                                                                            10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                                                                                                            SHA512

                                                                                                            65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019990001\f85d6dde45.exe

                                                                                                            Filesize

                                                                                                            429KB

                                                                                                            MD5

                                                                                                            51ff79b406cb223dd49dd4c947ec97b0

                                                                                                            SHA1

                                                                                                            b9b0253480a1b6cbdd673383320fecae5efb3dce

                                                                                                            SHA256

                                                                                                            2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                                                                                                            SHA512

                                                                                                            c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019991001\3e9f9bb10d.exe

                                                                                                            Filesize

                                                                                                            591KB

                                                                                                            MD5

                                                                                                            3567cb15156760b2f111512ffdbc1451

                                                                                                            SHA1

                                                                                                            2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                                                                                            SHA256

                                                                                                            0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                                                                                            SHA512

                                                                                                            e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019992001\54a6942107.exe

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                            MD5

                                                                                                            faf718856c97bf090fa14d751014aa12

                                                                                                            SHA1

                                                                                                            d536f3b51af70c809baa2759873791caeb8d6f38

                                                                                                            SHA256

                                                                                                            d56ba5e51f2ea3ce492e545bac05b0b5ca2c25ec6608ee2c2738d4f815b3eab2

                                                                                                            SHA512

                                                                                                            6c9b9d56df87eebd9824d499f8215d47ed8ddbded3d0fe9be7c3d87b2fcc9ca2f3f39f43ec7adfeff09540c51894fe2b3f1e7d7032d77bb5be50ae233855d161

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019993001\8056f2b8a7.exe

                                                                                                            Filesize

                                                                                                            2.5MB

                                                                                                            MD5

                                                                                                            87330f1877c33a5a6203c49075223b16

                                                                                                            SHA1

                                                                                                            55b64ee8b2d1302581ab1978e9588191e4e62f81

                                                                                                            SHA256

                                                                                                            98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                                                                                            SHA512

                                                                                                            7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019994001\8460b4361a.exe

                                                                                                            Filesize

                                                                                                            758KB

                                                                                                            MD5

                                                                                                            afd936e441bf5cbdb858e96833cc6ed3

                                                                                                            SHA1

                                                                                                            3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                                                                            SHA256

                                                                                                            c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                                                                            SHA512

                                                                                                            928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019995001\188e3f93be.exe

                                                                                                            Filesize

                                                                                                            4.3MB

                                                                                                            MD5

                                                                                                            9b5f11b32797376f3e6cd1ecf8186d6f

                                                                                                            SHA1

                                                                                                            e3017af240a5903abbf28380acecce1e7a2deb53

                                                                                                            SHA256

                                                                                                            6e1efd9c3363d42d84e8366950569eec036082d1c906cab945dd6a4246210f39

                                                                                                            SHA512

                                                                                                            e84d09e43282a19c35cba1d82e5734cc06f6631fb070105093e570ccb022b6af95eb8fc544d64306a8ab69246cf3c56223a23029500545e65968f83e18cddc72

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019996001\aee4a8b7f4.exe

                                                                                                            Filesize

                                                                                                            1.9MB

                                                                                                            MD5

                                                                                                            63737b2ece68d77276edc5d3b31e5fe3

                                                                                                            SHA1

                                                                                                            ff8a0b492f95baae647c322c6c44f6a479c89433

                                                                                                            SHA256

                                                                                                            87a8db1b4e00856261a01ddcc80a09fcb9f70c7c4fc665ef3b6701f63ca44f27

                                                                                                            SHA512

                                                                                                            e2fdf7e5cbdb2fb30d195024b1197e0f885a15d8ed52058695d82de4865c682ce3ad64ed9549f78cf87a3019fccf3f2c27e3f992b34305baa50bfa9ba8114cd6

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019997001\f30995d76a.exe

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            f54dd0914c65108d5f72049dc5490f53

                                                                                                            SHA1

                                                                                                            2698c99f98e65b28f31f9bdc0e68b6941de38f2a

                                                                                                            SHA256

                                                                                                            4a2803914a4269806a4cb5525ec40edaf2274e496d0e9d87be9988d1da4b02d5

                                                                                                            SHA512

                                                                                                            f07cf1d239db394739a491cb72943411aefee4de229b3b9ce9057c42c02bcd33b63e67fc642507754a704e10dea6c095ae064c283543b0fadfca0d2bcddc701d

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019998001\65fd7c7d02.exe

                                                                                                            Filesize

                                                                                                            2.7MB

                                                                                                            MD5

                                                                                                            32002d72d0769b00500155759da96aae

                                                                                                            SHA1

                                                                                                            9e00292c00b1551a6d4120005c2e09065fd58b08

                                                                                                            SHA256

                                                                                                            b7828dd79ba9edc79def290472e98857282a314ecd3dc30f5a050749a6a47227

                                                                                                            SHA512

                                                                                                            56b25fa079232a59937e81fc9767db953122da2025d9f856c4c7f38a7a78a5ff27215d047e7bbf87c97f645a4153abd53f4c8375f0d7c36e8c0e1ae2f975fed6

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1019999001\77fa187db6.exe

                                                                                                            Filesize

                                                                                                            947KB

                                                                                                            MD5

                                                                                                            c155fca9bedaa244312d0159d7996f21

                                                                                                            SHA1

                                                                                                            e40e8d8cdc48d05150638fedd76c8184d9ff3d58

                                                                                                            SHA256

                                                                                                            e0341959dbf7276dfe320aca90d950c9db26df872e99a0b5a9072807928533c7

                                                                                                            SHA512

                                                                                                            f970b0ac8722d79871d4e5fcf4d8c9d4fb44dcec0ca763cc9b2f4f6b47259fe7682470f016586ff8c6c5c1bee35d4fc4865823d5dcb9460711aa54a543122430

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1020000001\219a708879.exe

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                            MD5

                                                                                                            6e0aa540473c4c5fb03d9d0bcf43122b

                                                                                                            SHA1

                                                                                                            c25e85651b062e511d9d744a93f7262c57f4fd98

                                                                                                            SHA256

                                                                                                            b0f26d68fbfff90785652aae3cbb19b3abc277ae4df18047cb54b2f4b6ca0d57

                                                                                                            SHA512

                                                                                                            391defb66f570e5b355899b101a6de49b0557c73a41f5dd8566a51849faa85194de287f900f849439e7029989c9d1c972a6d097efc316e690fd9325914c91455

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1d52N9.exe

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                            MD5

                                                                                                            b48526e3264a9ebf9ae221df76f8511e

                                                                                                            SHA1

                                                                                                            51141f95d23355a1891b88e470b2c9a3e44ba92e

                                                                                                            SHA256

                                                                                                            42ee113ccf756a8e8950cb81a36558e707f20f59aef11401ca08269cce065c0f

                                                                                                            SHA512

                                                                                                            ad26656d29e916e06d26de91f0da8703c1f677bd369196e282f6e1eec3a0baca504a564607b4e6f7d18b8ac350428aaff01e2f39ccc435715526daaae1a0e100

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2z9698.exe

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            157a5af38553ccb117f6d278b2b046f0

                                                                                                            SHA1

                                                                                                            9793935e64772bb6fa3665d090fb7e9d448ad438

                                                                                                            SHA256

                                                                                                            a0d75064673f21a234d5556762f77ee96daad893e015824d7526cb965df0dd44

                                                                                                            SHA512

                                                                                                            0798f89180e91f76c357683f05cfe1103db048fdb4428f25417e141530275bb753aaf96cc5d16b5d9497878434cf05047b8e515a5a155d57e3e3b0005b7b66b6

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fdedondb.k3r.ps1

                                                                                                            Filesize

                                                                                                            60B

                                                                                                            MD5

                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                            SHA1

                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                            SHA256

                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                            SHA512

                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                                                            Filesize

                                                                                                            1.6MB

                                                                                                            MD5

                                                                                                            72491c7b87a7c2dd350b727444f13bb4

                                                                                                            SHA1

                                                                                                            1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                                                            SHA256

                                                                                                            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                                                            SHA512

                                                                                                            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                                                            Filesize

                                                                                                            458KB

                                                                                                            MD5

                                                                                                            619f7135621b50fd1900ff24aade1524

                                                                                                            SHA1

                                                                                                            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                                                            SHA256

                                                                                                            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                                                            SHA512

                                                                                                            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                                                                                            Filesize

                                                                                                            2.2MB

                                                                                                            MD5

                                                                                                            579a63bebccbacab8f14132f9fc31b89

                                                                                                            SHA1

                                                                                                            fca8a51077d352741a9c1ff8a493064ef5052f27

                                                                                                            SHA256

                                                                                                            0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                                                                                                            SHA512

                                                                                                            4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            5659eba6a774f9d5322f249ad989114a

                                                                                                            SHA1

                                                                                                            4bfb12aa98a1dc2206baa0ac611877b815810e4c

                                                                                                            SHA256

                                                                                                            e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                                                                                                            SHA512

                                                                                                            f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            5404286ec7853897b3ba00adf824d6c1

                                                                                                            SHA1

                                                                                                            39e543e08b34311b82f6e909e1e67e2f4afec551

                                                                                                            SHA256

                                                                                                            ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                                                                                                            SHA512

                                                                                                            c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            5eb39ba3698c99891a6b6eb036cfb653

                                                                                                            SHA1

                                                                                                            d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                                                                                                            SHA256

                                                                                                            e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                                                                                                            SHA512

                                                                                                            6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            7187cc2643affab4ca29d92251c96dee

                                                                                                            SHA1

                                                                                                            ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                                                                                            SHA256

                                                                                                            c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                                                                                            SHA512

                                                                                                            27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            b7d1e04629bec112923446fda5391731

                                                                                                            SHA1

                                                                                                            814055286f963ddaa5bf3019821cb8a565b56cb8

                                                                                                            SHA256

                                                                                                            4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                                                                                            SHA512

                                                                                                            79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            0dc4014facf82aa027904c1be1d403c1

                                                                                                            SHA1

                                                                                                            5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                                                                                            SHA256

                                                                                                            a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                                                                                            SHA512

                                                                                                            cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                            MD5

                                                                                                            cea368fc334a9aec1ecff4b15612e5b0

                                                                                                            SHA1

                                                                                                            493d23f72731bb570d904014ffdacbba2334ce26

                                                                                                            SHA256

                                                                                                            07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                                                                                            SHA512

                                                                                                            bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                            MD5

                                                                                                            045b0a3d5be6f10ddf19ae6d92dfdd70

                                                                                                            SHA1

                                                                                                            0387715b6681d7097d372cd0005b664f76c933c7

                                                                                                            SHA256

                                                                                                            94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                                                                            SHA512

                                                                                                            58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                                                            Filesize

                                                                                                            440B

                                                                                                            MD5

                                                                                                            3626532127e3066df98e34c3d56a1869

                                                                                                            SHA1

                                                                                                            5fa7102f02615afde4efd4ed091744e842c63f78

                                                                                                            SHA256

                                                                                                            2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                                                                            SHA512

                                                                                                            dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir6376_1095854339\CRX_INSTALL\_locales\en\messages.json

                                                                                                            Filesize

                                                                                                            711B

                                                                                                            MD5

                                                                                                            558659936250e03cc14b60ebf648aa09

                                                                                                            SHA1

                                                                                                            32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                            SHA256

                                                                                                            2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                            SHA512

                                                                                                            1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir6376_1095854339\df5d3947-c8c5-49de-9965-865253fae461.tmp

                                                                                                            Filesize

                                                                                                            150KB

                                                                                                            MD5

                                                                                                            14937b985303ecce4196154a24fc369a

                                                                                                            SHA1

                                                                                                            ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                                                                                            SHA256

                                                                                                            71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                                                                                            SHA512

                                                                                                            1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                            Filesize

                                                                                                            479KB

                                                                                                            MD5

                                                                                                            09372174e83dbbf696ee732fd2e875bb

                                                                                                            SHA1

                                                                                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                            SHA256

                                                                                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                            SHA512

                                                                                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                            Filesize

                                                                                                            13.8MB

                                                                                                            MD5

                                                                                                            0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                            SHA1

                                                                                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                            SHA256

                                                                                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                            SHA512

                                                                                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe

                                                                                                            Filesize

                                                                                                            1.7MB

                                                                                                            MD5

                                                                                                            83d75087c9bf6e4f07c36e550731ccde

                                                                                                            SHA1

                                                                                                            d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                                                                                                            SHA256

                                                                                                            46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                                                                                                            SHA512

                                                                                                            044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                                                                                            Filesize

                                                                                                            10KB

                                                                                                            MD5

                                                                                                            4555a2c7073fbe5fea456a5aea99088e

                                                                                                            SHA1

                                                                                                            a3af125d7da6bfe2ee32a35ea9078b786f08da96

                                                                                                            SHA256

                                                                                                            2374e26d916824a2e787eac898f34620f212c609bdbbfe362da244d1d8b6dd9b

                                                                                                            SHA512

                                                                                                            6b4cc228f46ec9b95fd04365e57657edbaf5e99c098aad55bb9a3f87684ed31c75f157ecb8960ed809b44021aa73dfe214c4a2aa9376feb2dac12b4eca427678

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            c8966ca504d844138ab7b1df250950a9

                                                                                                            SHA1

                                                                                                            0e7158fee16a906bde71ec89736ea7c70e629650

                                                                                                            SHA256

                                                                                                            48bcf4624fafc33279d268273400ac1ec2c8cc5332f1a615732ad806b8391ccb

                                                                                                            SHA512

                                                                                                            d82c69c6da0bf0a33c92432d496f17f6b45bc2a7690bf6c86fbc6ed0f704d96bc42930f633b77027b9b1fd563901c89cd98476df4d13bec3ef013ef841901993

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            5ddeb9ce5671e2871bc94373d4f377c1

                                                                                                            SHA1

                                                                                                            961d23f9c5801f0cd84263bdac2f83a8db6669b6

                                                                                                            SHA256

                                                                                                            68ee4c19359805714759992adb209b41a951cd2dff0beaa7ee5b0cb7854a0c26

                                                                                                            SHA512

                                                                                                            ef8fc29192ab2bac52b9b591de0f6479143e2a30b2850e4e39b950f57b8e68226034bc9bf0817f4f85f45e656196b0fb59f696f300ed28587b825e08f70d8f30

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                            Filesize

                                                                                                            22KB

                                                                                                            MD5

                                                                                                            942fd338062b2dc702076fb7d8480f75

                                                                                                            SHA1

                                                                                                            768971c7432035e413cfe9f971fb748d27e8fed0

                                                                                                            SHA256

                                                                                                            6291a141fa58700e23e095f2a067df92d7b0cd2c9e4de3609d5fda55932a9c39

                                                                                                            SHA512

                                                                                                            f4642facb0993c67e63aee89181f4431410f86477bdca82e96fc721bb07efe9001ba0c4b229cce7c175105ef05c0823975d5e0b0ca55e3d429a0f924ebcb76cd

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            a1107965643d6750060063bcc6943eba

                                                                                                            SHA1

                                                                                                            2997bb53da0dc732d9e7ea6e3bcdb79019c946e0

                                                                                                            SHA256

                                                                                                            3b756742053c7de6491ed09e422b4abb316d52dbe52e683b60792e6072062ea0

                                                                                                            SHA512

                                                                                                            20274f253833b6d392ce07847db5a6f0e53e2291f9bee77dad95f79ee987967b7ca4a6906eaa71900357e8dcb313c3bd65251e91cb26666f1d3516527fc58ad0

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            901559b895fdd1270ca48f534696f88f

                                                                                                            SHA1

                                                                                                            6dac41f85946e8e223022a2714721b9f30156857

                                                                                                            SHA256

                                                                                                            81e916fef0db1a2e32ead322e93da0c23f7fe376eaaa0c88fb1c8a9d38713a81

                                                                                                            SHA512

                                                                                                            0bf4c95fea6449365627eee5909584fa6a080ea00419d82ba26a684b206bc04c1f9f06016ef75139e54dc548d0c0b405562e1730013d7e741e1214bb00d7fd75

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            eb185de496519c0ee44608b2ff6e7ea0

                                                                                                            SHA1

                                                                                                            bd4c6d48015f9ebf37a25c123cd18fe6299638bd

                                                                                                            SHA256

                                                                                                            8feb77f8de09e5bbf0caad5981420ac512a740fc3d5522af21ab4fbbd9b43ce1

                                                                                                            SHA512

                                                                                                            ac4af2510644ffefa1bdd69f8acc707e957aad1f62a3835875c5ce382dd93a1a18011b06bbe11db177869c8e508cc21ca15b9f2973a2ca56a7625c7dce58f454

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            afab3ab6d0ea0d92f0184096ffe63d2d

                                                                                                            SHA1

                                                                                                            44e148aa4e4038fc5436d36765eefe03dce25374

                                                                                                            SHA256

                                                                                                            cb928c0606989176fda141799d44b213b1d1c872c0420553aa9abd55cc3e5fde

                                                                                                            SHA512

                                                                                                            299877cef6a523c0b784baee06b737d74fc53779c5c820753575b28f16a05f5ba003300fcaf5c0cb36984828f277c618d725973373b6a09e1d982c3796136889

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            92f913c00c189099db4a851161c44ab7

                                                                                                            SHA1

                                                                                                            f58c82b38e610b75cd88b6e928433471894a8c03

                                                                                                            SHA256

                                                                                                            c51a2eeb5d201cdde674e56dfe1779832cfc6cce5a0b8a51ec6716adf35463de

                                                                                                            SHA512

                                                                                                            f6e7f1265f8a594ec62d911300c2e1947beb7c23ca8c5962459c235dcf12f7ab61742c091b64c77abb6d954946e1e25980d5afe060229f2af9ed33366afce13a

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            15950be6b6cb132c1c71907a77f38f29

                                                                                                            SHA1

                                                                                                            f151c08558f0ca92c2061279a197666a70affb14

                                                                                                            SHA256

                                                                                                            41423b2d1a8a98fb432a05d6cab7d01cbcadddf04ede74f3242f20db1dd8c078

                                                                                                            SHA512

                                                                                                            da0033cc0c4c31541fcb9be25f37e2ed2572e6dee34e8ccedcdfbb6dca9c8bdd17e644ff6170b9c85a35c488f2981151a742456e560d0edf6c07e2c5b547128d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            6bc026410fd9e473580a504b9e4634e9

                                                                                                            SHA1

                                                                                                            b92302551f1c2295d7249aea9dcd54c7cef7ad8a

                                                                                                            SHA256

                                                                                                            d0f5aed542359ea5bd355be7f8622f2b8fa77ef2ac95eb0e8d598d2b4c61bc34

                                                                                                            SHA512

                                                                                                            802e3d7f1cdfbeb2fd83f710b19626bf728dd441909301cc73b985983f63628158ba9e87c1d808d5467e6db95f671a9ab429adf8e62cce3041b19257a58f243b

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\2d045099-2473-4287-87ae-68d1def56ae9

                                                                                                            Filesize

                                                                                                            671B

                                                                                                            MD5

                                                                                                            25875be176e1a8c01dae9cfd9ae02627

                                                                                                            SHA1

                                                                                                            1fa0430f4692f17bdd8f8436053dc131a94977cc

                                                                                                            SHA256

                                                                                                            842335dbb7a5f9c23859514f7fe2e3cf70ef7ac9f5173723da8b1de8dceb5cab

                                                                                                            SHA512

                                                                                                            f657d62f995a292bf6bd4e4f27505d501b6cbb0b8c7a308a584b35b26cab1c1861d2d850c90c24fa6539df346ef6df2993d8bd5a76b1c59b9116ca2a74245d6d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\61b91ca1-1a12-4cda-81e9-75889cc0e8c4

                                                                                                            Filesize

                                                                                                            27KB

                                                                                                            MD5

                                                                                                            bb80682b588650d28c2ea044e89b4e63

                                                                                                            SHA1

                                                                                                            835c270d9f5a5d059d1bd07ceaaa6d13e91fab21

                                                                                                            SHA256

                                                                                                            523e2673a54a02bb148d7861ccd67ae270de9916b60f6f6d44fe3ac662f093bc

                                                                                                            SHA512

                                                                                                            20f10e86465911714ed022c8819aa475dc7de0d74d4823f87c85f3887052cf030d547b80c83ed173e65ba869b58fef3a42bc8f42e9a274f185b348fbbf3e6c02

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\c41c43d8-0c16-4add-92ba-842c92e40e85

                                                                                                            Filesize

                                                                                                            982B

                                                                                                            MD5

                                                                                                            14a17234f752d256c6b20b16199f0f23

                                                                                                            SHA1

                                                                                                            074d7a7cde2ee7438244668eddc76ea4f3c288d4

                                                                                                            SHA256

                                                                                                            9af849990bb7a9e139c5d241869d2fc02f1e7cfda09bf2837df633ed84dd1cc8

                                                                                                            SHA512

                                                                                                            e336ef9d4aa5804e87710e3c875fb038198a8e09cf398bbf5cfa3185ed86bc93f70d14e3825a5c91eb225769309beb50239d2b5fc20aa4c30d6a3d8f4b007549

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                            Filesize

                                                                                                            1.1MB

                                                                                                            MD5

                                                                                                            842039753bf41fa5e11b3a1383061a87

                                                                                                            SHA1

                                                                                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                            SHA256

                                                                                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                            SHA512

                                                                                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                            Filesize

                                                                                                            116B

                                                                                                            MD5

                                                                                                            2a461e9eb87fd1955cea740a3444ee7a

                                                                                                            SHA1

                                                                                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                            SHA256

                                                                                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                            SHA512

                                                                                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                            Filesize

                                                                                                            372B

                                                                                                            MD5

                                                                                                            bf957ad58b55f64219ab3f793e374316

                                                                                                            SHA1

                                                                                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                            SHA256

                                                                                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                            SHA512

                                                                                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                            Filesize

                                                                                                            17.8MB

                                                                                                            MD5

                                                                                                            daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                            SHA1

                                                                                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                            SHA256

                                                                                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                            SHA512

                                                                                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                                                                                            Filesize

                                                                                                            15KB

                                                                                                            MD5

                                                                                                            61e85b254aef00f4b076cf24dd58a79c

                                                                                                            SHA1

                                                                                                            be729aeb113c5676e3d0711f7a204dd4a95c8618

                                                                                                            SHA256

                                                                                                            081157591b60d94235f7250bc4aac9f52efde482e16289c71c0c83a155852be4

                                                                                                            SHA512

                                                                                                            cac70de31552e96589290da249d3f16de95cee5e97db158412889f89c5b9b11a0c6089993da4ab10e23fd25a14c0ad2416b3b426411eccef04ca10173bbd87fd

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                                                                                            Filesize

                                                                                                            10KB

                                                                                                            MD5

                                                                                                            5f66e634bf3d54f522e40bb7be51ffd5

                                                                                                            SHA1

                                                                                                            e8bcd0a6473ccdaffd896c22d6c0a6b27e0999b3

                                                                                                            SHA256

                                                                                                            4826ca6c5ab9718387b1efddd2e954a70fe5bd7e2e34c687b6c5745ddca929c8

                                                                                                            SHA512

                                                                                                            689421dbdc394a64d542761f779bd5aebc6491eac10a786cda52c8d6a8410c1c27a287031c5aca3201732c973eb2550848920556443d44a28e2ce4f79c8313f2

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                                                                                            Filesize

                                                                                                            12KB

                                                                                                            MD5

                                                                                                            0bb40419520f8c8c454d6063e3788996

                                                                                                            SHA1

                                                                                                            968086cdb66e399eb74190c0cb38f5176d68df24

                                                                                                            SHA256

                                                                                                            db1055c593ee6bbdd83193b844654e278287c4f26643d23c66e7c508f42e35a0

                                                                                                            SHA512

                                                                                                            078e1b775279a6f14abf76e1469418df5ecc5dc5f9e7e6776c1d830d4c367cebb85047ab45aee64e5009c1eea3ca025fbb11f96bf8bbb8be63bd37a94c62bc9d

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            962449c44e0da492165f9297c7f3ca18

                                                                                                            SHA1

                                                                                                            e39361c8c98f42c21c344892dbb379e1efeb17c7

                                                                                                            SHA256

                                                                                                            771d70d41714820db2c778d4f557515cd0409c5ee020263ac07be57b24a65e8e

                                                                                                            SHA512

                                                                                                            d89ac719d023800ee7244e233955e70b0773775a44ab76a66c9d8d7dd541038db8e10d504c9fc43c62cec2d8604f6fefb179853e0c355dbcad8fbff6f75bc347

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\security_state\data.safe.bin

                                                                                                            Filesize

                                                                                                            2.9MB

                                                                                                            MD5

                                                                                                            09b136ce16a665b7c4fa18a5bd2d9286

                                                                                                            SHA1

                                                                                                            44b6f04c46520d36ea424659e42b22251c95c759

                                                                                                            SHA256

                                                                                                            d6f5712db0f7ad09ed832db20a3bf1da072581fe65c309e5bcf733424687ff51

                                                                                                            SHA512

                                                                                                            2cf08bf7ac36747bab9ac4a665b71a5d01b9653f92ea93275e4f8216b4909b384e5d5987052ea84e0b2a8e9c378db2140509e8c7c4234c66c43e0cf9ec2e432b

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                            Filesize

                                                                                                            2.3MB

                                                                                                            MD5

                                                                                                            4ac645020c0ab2504419c2cafc0569f4

                                                                                                            SHA1

                                                                                                            26eb5e8d7faa6c1e16f5e1ef6cb0c65cd08e2073

                                                                                                            SHA256

                                                                                                            52fc913889448bd10b82d7c0970a00172e97362bc3c4a988bbfd842f7f49bf58

                                                                                                            SHA512

                                                                                                            9f79f93bae920fc6f356e4edda02aa86084a357dd1cb20c9df00598df7cd1399a4913281aac5a6d8fae734bd9275f9cf2227be8ea5fe656b6c6fd4feedcd3fb4

                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                            Filesize

                                                                                                            2.4MB

                                                                                                            MD5

                                                                                                            80a215d24f6225a4e6ac4ccc1a8d6d44

                                                                                                            SHA1

                                                                                                            d1177f172f12b13ffdb72b61140bbb0ba3aac6ba

                                                                                                            SHA256

                                                                                                            88398a6a285569faabcf7021eaa6361c761650770ab9de3e913bcb518e15d22e

                                                                                                            SHA512

                                                                                                            6a1300fbf836b8fd28ef3a56996e97a1607ecda80139919e7165049d926c51116ad6e7537cfd4d56e804b2779c12f53fd949070d36104500f065051ece1d77cc

                                                                                                          • memory/2300-340-0x0000000000640000-0x00000000012C1000-memory.dmp

                                                                                                            Filesize

                                                                                                            12.5MB

                                                                                                          • memory/2300-342-0x0000000000640000-0x00000000012C1000-memory.dmp

                                                                                                            Filesize

                                                                                                            12.5MB

                                                                                                          • memory/2708-257-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-268-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-259-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-267-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                            Filesize

                                                                                                            128KB

                                                                                                          • memory/2708-260-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-263-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-261-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-258-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-266-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-262-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-256-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2708-280-0x0000000140000000-0x0000000140770000-memory.dmp

                                                                                                            Filesize

                                                                                                            7.4MB

                                                                                                          • memory/2988-136-0x000002BA613C0000-0x000002BA613E2000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/3028-10-0x0000000000450000-0x0000000000776000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/3028-9-0x0000000000451000-0x000000000047F000-memory.dmp

                                                                                                            Filesize

                                                                                                            184KB

                                                                                                          • memory/3028-8-0x0000000076FA4000-0x0000000076FA6000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/3028-11-0x0000000000450000-0x0000000000776000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/3028-7-0x0000000000450000-0x0000000000776000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/3028-25-0x0000000000450000-0x0000000000776000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/3048-219-0x00000000004D0000-0x000000000113B000-memory.dmp

                                                                                                            Filesize

                                                                                                            12.4MB

                                                                                                          • memory/3048-359-0x00000000004D0000-0x000000000113B000-memory.dmp

                                                                                                            Filesize

                                                                                                            12.4MB

                                                                                                          • memory/3048-323-0x00000000004D0000-0x000000000113B000-memory.dmp

                                                                                                            Filesize

                                                                                                            12.4MB

                                                                                                          • memory/3048-325-0x00000000004D0000-0x000000000113B000-memory.dmp

                                                                                                            Filesize

                                                                                                            12.4MB

                                                                                                          • memory/3308-255-0x00007FF6D7940000-0x00007FF6D7DD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/3308-265-0x00007FF6D7940000-0x00007FF6D7DD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/3616-113-0x00007FF6AB7F0000-0x00007FF6ABC80000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/3616-112-0x00007FF6AB7F0000-0x00007FF6ABC80000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/3616-199-0x00007FF6AB7F0000-0x00007FF6ABC80000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/3864-233-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/3864-242-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-1718-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-324-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-23-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-111-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-141-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-217-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-989-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-390-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-1836-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4008-360-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4204-1150-0x0000000000CD0000-0x00000000011C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.9MB

                                                                                                          • memory/4204-1032-0x0000000000CD0000-0x00000000011C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.9MB

                                                                                                          • memory/4204-406-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                            Filesize

                                                                                                            972KB

                                                                                                          • memory/4204-1776-0x0000000000CD0000-0x00000000011C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.9MB

                                                                                                          • memory/4204-1843-0x0000000000CD0000-0x00000000011C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.9MB

                                                                                                          • memory/4204-404-0x0000000000CD0000-0x00000000011C2000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.9MB

                                                                                                          • memory/4296-1847-0x00007FF6D7940000-0x00007FF6D7DD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/4296-1861-0x00007FF6D7940000-0x00007FF6D7DD0000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/4380-322-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                                            Filesize

                                                                                                            344KB

                                                                                                          • memory/4380-320-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                                            Filesize

                                                                                                            344KB

                                                                                                          • memory/4380-318-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                                            Filesize

                                                                                                            344KB

                                                                                                          • memory/4428-1844-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4428-1846-0x0000000000BB0000-0x0000000000ED6000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.1MB

                                                                                                          • memory/4828-29-0x00000000005C0000-0x0000000000A45000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.5MB

                                                                                                          • memory/4828-30-0x00000000005C0000-0x0000000000A45000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.5MB

                                                                                                          • memory/4856-383-0x00000000001C0000-0x0000000000645000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.5MB

                                                                                                          • memory/4856-374-0x00000000001C0000-0x0000000000645000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.5MB

                                                                                                          • memory/5016-130-0x00000000006E0000-0x0000000000B78000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/5016-143-0x00000000006E0000-0x0000000000B78000-memory.dmp

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                          • memory/5044-1420-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.4MB

                                                                                                          • memory/5044-386-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.4MB

                                                                                                          • memory/5044-1567-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.4MB

                                                                                                          • memory/5044-448-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.4MB

                                                                                                          • memory/5044-378-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                            Filesize

                                                                                                            112KB

                                                                                                          • memory/5044-356-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.4MB

                                                                                                          • memory/5044-387-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                                                                            Filesize

                                                                                                            8.4MB

                                                                                                          • memory/7796-1033-0x00000000009F0000-0x0000000000C96000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                          • memory/7796-1727-0x00000000009F0000-0x0000000000C96000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                          • memory/7796-1144-0x00000000009F0000-0x0000000000C96000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                          • memory/7796-1143-0x00000000009F0000-0x0000000000C96000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB

                                                                                                          • memory/7796-1775-0x00000000009F0000-0x0000000000C96000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.6MB