Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-07-2024 05:26

General

  • Target

    9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe

  • Size

    1.8MB

  • MD5

    33deaa408984ab9e79f4b7864feb75a3

  • SHA1

    53f66d532cc556d29ded01b3cdfe3aae77cebf89

  • SHA256

    9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc

  • SHA512

    786ea3d97cc400e83ac7d067d508b568be042a2c4f6232da18761feff236beea6f3d5cd800ba197030acf79086917e14c63013a1b59660b77c6b096dd4ed6d1e

  • SSDEEP

    49152:8shtW+ObQly4ff1kECEiNRhX/PvILmgI5aX1Y5O3CU2O:FtOaiNRhX/CmgI/tJO

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

valenciga

C2

http://45.158.12.58

Attributes
  • url_path

    /e47233787df7c9a6.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe
    "C:\Users\Admin\AppData\Local\Temp\9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe
        "C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3648
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CDC0.tmp\CDC1.tmp\CDD1.bat C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4256
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffc1be3cc40,0x7ffc1be3cc4c,0x7ffc1be3cc58
              6⤵
                PID:3576
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1904 /prefetch:2
                6⤵
                  PID:4380
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2472 /prefetch:3
                  6⤵
                    PID:548
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2112,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2588 /prefetch:8
                    6⤵
                      PID:1660
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3132 /prefetch:1
                      6⤵
                        PID:6436
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3168 /prefetch:1
                        6⤵
                          PID:6448
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=228,i,7740000362868778595,8824767094344746395,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4612 /prefetch:8
                          6⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4284
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                        5⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:4364
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffc1bcf46f8,0x7ffc1bcf4708,0x7ffc1bcf4718
                          6⤵
                            PID:684
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
                            6⤵
                              PID:3856
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3652
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
                              6⤵
                                PID:4320
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                                6⤵
                                  PID:5064
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                  6⤵
                                    PID:2284
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                    6⤵
                                      PID:5784
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17464585868093344827,10225191924741336967,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:2
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5056
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                    5⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:832
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                      6⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2984
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1912 -parentBuildID 20240401114208 -prefsHandle 1820 -prefMapHandle 1812 -prefsLen 25753 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e372cf7-0761-471f-b232-b6ac17d6c24f} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" gpu
                                        7⤵
                                          PID:4568
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2400 -parentBuildID 20240401114208 -prefsHandle 2368 -prefMapHandle 2364 -prefsLen 26673 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce026020-89e5-4cb6-a640-7f1121fd6b7e} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" socket
                                          7⤵
                                            PID:2976
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2968 -childID 1 -isForBrowser -prefsHandle 2980 -prefMapHandle 3000 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b25c4308-fc78-4812-b0fc-a7df0afda63d} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab
                                            7⤵
                                              PID:5560
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3444 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 3036 -prefsLen 31163 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c18d0e0a-53b8-4967-b6ef-ba16d76da5e8} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab
                                              7⤵
                                                PID:5860
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4624 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4620 -prefMapHandle 4616 -prefsLen 31163 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {673a8734-8113-4214-bb7f-884d3cb33c04} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" utility
                                                7⤵
                                                • Checks processor information in registry
                                                PID:5692
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 4636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb20d9e8-1c64-45af-a93e-d0ea9d2d355e} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab
                                                7⤵
                                                  PID:5116
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5532 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ed9d8fd-3e85-4536-8165-f1d1de4f3851} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab
                                                  7⤵
                                                    PID:5256
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5680 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55148f8f-bc92-4f2f-ae27-302448147e17} 2984 "\\.\pipe\gecko-crash-server-pipe.2984" tab
                                                    7⤵
                                                      PID:5272
                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                              "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                                              3⤵
                                                PID:1544
                                              • C:\Users\Admin\1000029002\8bb006a9d9.exe
                                                "C:\Users\Admin\1000029002\8bb006a9d9.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:6988
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 1420
                                                  4⤵
                                                  • Program crash
                                                  PID:6080
                                              • C:\Users\Admin\AppData\Local\Temp\1000030001\ebf2bec0bb.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000030001\ebf2bec0bb.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5512
                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2824
                                                  • C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Checks processor information in registry
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4328
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1268
                                                      6⤵
                                                      • Program crash
                                                      PID:6256
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2588
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5656
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                1⤵
                                                  PID:6684
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6988 -ip 6988
                                                  1⤵
                                                    PID:6040
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3180
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4328 -ip 4328
                                                    1⤵
                                                      PID:2656
                                                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                      C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2352
                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4292
                                                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                      C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2772
                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:6252

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\1000029002\8bb006a9d9.exe

                                                      Filesize

                                                      2.5MB

                                                      MD5

                                                      72230d8efc579eaab4852e555f410c00

                                                      SHA1

                                                      5650597c7f86092b999b284b9364b083f3a140e8

                                                      SHA256

                                                      fec0c11ef40a4bffb95b80f18e445dfaac26d65650e235bd1f181219823d943c

                                                      SHA512

                                                      a198b9a0a26961d96da5e0d4c0a55ea54ec084306a476c93a9663d5d45eb0b46c75cedffe9613cae993782e242fc737cdca150a018876ec9363ac95fbe1f3fd1

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      264B

                                                      MD5

                                                      29eaec9b2d04f4eae6ff0f6fc9f1e55e

                                                      SHA1

                                                      b37ed5a9beacf0276343bd533bedfebf35c578e3

                                                      SHA256

                                                      34a013ec4a697aec6974c49b8418046825b9b64059278a978cc56c390f0324ca

                                                      SHA512

                                                      e2302d4bb892aea13191ab7055f9a29823ab755296e1af50f8fe833655c4da1e8182b13e779cc191fc9161322a9cc84783aba0cbca7c45bb516a6c26938058da

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      e90271bc03d6a731bfd4722f5d2f97c7

                                                      SHA1

                                                      0dfc67efced8b7ee4ce0428b8e4633108a3f50d8

                                                      SHA256

                                                      6764b5e5b3299e0646f68097d2be9b0ce29852026f4561eaad7f2d2275aa0848

                                                      SHA512

                                                      cff4417f7f7ff291825f651adc86d0e8ee2ce90835346621082fcd289783965472dc002083a779140951c50c23fa767c6bc2a1724128a7120bfafaecacf6ba8a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      356B

                                                      MD5

                                                      53bb52226fc190db9d1541be5840778a

                                                      SHA1

                                                      f9e30e4d4c80a1141852cf72c25c61efc2f73ddc

                                                      SHA256

                                                      be8abbb8c53296764b6362b6f1c64352dfef61487dba02a97a50edcb8822d75e

                                                      SHA512

                                                      417e09693b3ce8bbf3fd29f5467e4c9b9c7a14a0cc33cc7edc58357569138664f68a2c4552aaca0dc107e3da952d84e1eaf9d6f299f9bf9eff305de59e370ba0

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      4b465b73d3bb394894ce95b76332d119

                                                      SHA1

                                                      aee9339e5fd48460b34f21dc833cde71e7e25b38

                                                      SHA256

                                                      8001b7bbb0caaf4b326f29166db95199e4a69620e3565a69a4623965dc2e1d88

                                                      SHA512

                                                      4108ab9c9ebdb3e29b2029f146a6470c2608fb528f1ff8130e41fd43079b02c61207e27d699a68ab88cae4670705891ed72ea787b6ee1947a7061ccc5ad1c805

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      d64fce7f84ed09f45ae101bd5fe61482

                                                      SHA1

                                                      cfd5acf25aa3e0b0c1f229a68319b9e3e2e2174f

                                                      SHA256

                                                      f1dc6b83784c53b5b31f2ccecf75c43216e8a5e477d1d27efd828c1f9f401650

                                                      SHA512

                                                      899e89ec04285612971660bd3b54074d99acd3d92a5b33821713d91b85679fe5ef3faf505ad7e5c3acf23bedc2950570201fcdd36e604155826db58909b29595

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      e800e8ff6d01a21d2ee0e6b75640603d

                                                      SHA1

                                                      1a3e1a7331027b81af87be23860a671b36fa719e

                                                      SHA256

                                                      12eea4c85976338410a10027028e71f99e86843ae5906ea68aba6fbdc1a4983e

                                                      SHA512

                                                      f6284a3520023783d93e36c9a0784ab12737357c4a97facbaf6d096537864d85f1039c5784db69ffcdfe3d15f7648f9713d3b9ab399425cb10aa3775c49af830

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      92486defcc9390dd3a2b0cec431c1337

                                                      SHA1

                                                      217141ac88a84c44b0b736b9c3564a8012944e66

                                                      SHA256

                                                      65cc3b866770498d7a0eccacbf17a879dec765c0c5b8794d253e1e8925e83267

                                                      SHA512

                                                      6f6d758117b4665263aaa7793c0e3b50f7cf5e1ab20a0110673742313c8b44f9620e5edfe07585a6cc1e9ffb2d0ce740d54f482162bb4ea63fcdc4a9667b0002

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      acd81bb2b3c6aac0e8e7f9839f16b349

                                                      SHA1

                                                      99e081eacdb71e976f930e49b9c2937057eef4b4

                                                      SHA256

                                                      a8b9a970c4d8749855616fe3fa72caae06afe9d4011ed18639c7924d36b922e9

                                                      SHA512

                                                      bcf1ccf307e11e3098b758d9aca940e42a8b15c189b27403bc1b2336a9b5d099e4aa80d8650f243a06dce7d2693a48b8943bb242a37017068918b02fbb5692c5

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      6f12b7af55d330958b6a8da02af783cc

                                                      SHA1

                                                      b7bdeac3693b7898c7ded7d6f663d7a9eece45b1

                                                      SHA256

                                                      8cb1139c6129cf92af000599932c28389ba00b80df7c503249c25a6b7ef4ebe3

                                                      SHA512

                                                      9c6d780bdcd543242557c448a4c274f89aa900f9e858e204c188c6b1edc243d2a24e117e9184f5cc9a2485b7324a7ae5245ce7b39601c1cece29835f61975906

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      4867c4b841e0b0e50ea3c8d71f1f44cb

                                                      SHA1

                                                      b8ffe676451268738a72445db31bf4f357cf9058

                                                      SHA256

                                                      e5864498b9427ec68668c3bd4a51eca11242e32b7f7350ca46fbd5d2f7aa3e9b

                                                      SHA512

                                                      d3474dd44a001f341651fd9a2eceed2be544d2aa98ab108d66035b37d613e1ea4e830c9c2dac8ab4abe2fbfdbf131f540dae383644c9f6dc334a4950feee523d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      3c21768e43d002f93cd6cb314f7ba48f

                                                      SHA1

                                                      e9f97d2e18ba8291115cea3b9504100a3671bb35

                                                      SHA256

                                                      f9bf93669457e1a03df027a9ce57b930bddd8dab782faf334e5322aeea165b9a

                                                      SHA512

                                                      6eb5f72e338dffaf88c139dbccd2cb4569f1f170a8a8b54d91a6bac9c80dfa869e8f10f1a13e0fd575fe00388dc7fa7d9d6aa8d616a0b93edac5fc06bc63cafb

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      c933a01db23d12b88e2b6c9b870e4aba

                                                      SHA1

                                                      5d5465887ea671fa9381baa2d769ed4fc438cad4

                                                      SHA256

                                                      7037b989f14c95a4b217376d4ff82be03a507ef1678bfeee9ab58389531ca333

                                                      SHA512

                                                      471f175bcc2cb3680f162897b9cf317582772514a8f986d5d3c376a553ede725e297d99f42b91407f27604b9e24926d7a8ed8da1908acdccc6dc3017d7dd9899

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      92KB

                                                      MD5

                                                      2a20b34de23b55958b125f781243c521

                                                      SHA1

                                                      8a32768ee4bf8a238c170384075c68a475f73a94

                                                      SHA256

                                                      3d642ad79813182fb97b26e35ddbae7d439238299ca42323e4ab8f0b0a5f11cf

                                                      SHA512

                                                      0b3eb59d52a56c27cad22946dce1265472cb7deecd33ca711989be78dc3e910f29d957d21b2837cf9e5b415687b9578f30a9d5364ee1444cda5c7c874f9a1936

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      92KB

                                                      MD5

                                                      ba567896ef4f2dac6550c5cea37c400f

                                                      SHA1

                                                      791a1636f34b92a4ef2df2ed1aa48ca93f9ca97d

                                                      SHA256

                                                      c8a834ba2b13b8ab520d66982d4fa341cffdf5b501d44ffafba6c4f928ed4b7d

                                                      SHA512

                                                      c9ae58a58f5aea99b933f81b00a3eeef89bb40d066a0b9bb613fd42fbfd87e78ad80e55cb314aa358602ac917a6ad03e3d74f9910395250793f73accf338fae2

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      3ee50fb26a9d3f096c47ff8696c24321

                                                      SHA1

                                                      a8c83e798d2a8b31fec0820560525e80dfa4fe66

                                                      SHA256

                                                      d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f

                                                      SHA512

                                                      479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      eaaad45aced1889a90a8aa4c39f92659

                                                      SHA1

                                                      5c0130d9e8d1a64c97924090d9a5258b8a31b83c

                                                      SHA256

                                                      5e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b

                                                      SHA512

                                                      0db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                      Filesize

                                                      33KB

                                                      MD5

                                                      daa6948a37ac312342600f2b96db15ea

                                                      SHA1

                                                      0bfa2e04bf51480baf1fc7e7819f65cd3b0c90ba

                                                      SHA256

                                                      de7cf820e8eb0aa51d82aff3a848fd853dfa878674cc67094aee0ac115c85fee

                                                      SHA512

                                                      5af3ceb0a4c56b767792ad349b83a179191d9fe6dca8e3795cb48edb87ae6a8b89e51a64ebedd68857c674befd71dc1664a2e8380ac21abacc9566329d8c2e14

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                      Filesize

                                                      38KB

                                                      MD5

                                                      a1cbc8600fb0e0b668df61bb5d1737f9

                                                      SHA1

                                                      65aaea9cf40ee7aafcf033f35980aac172b0a267

                                                      SHA256

                                                      b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb

                                                      SHA512

                                                      c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      216B

                                                      MD5

                                                      15fcc5a0cf4457549e108a8f8a64104d

                                                      SHA1

                                                      12bbb230e476a8335c76e431d028c3ab66c9dc7f

                                                      SHA256

                                                      1d501bbd2d388fd112ccd7d64513a98a45811cd365f6c0abf2d258c5a41444aa

                                                      SHA512

                                                      3b6e146376aa3145d3e1c2d2827ec502f0038415d2c511f66c97efbeaf6d657947203f88091bf6a87e1a8a38660c989a6b490b9c807b55fcf4f41e0656ed7315

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      d2348677a70629ede0badda6e0d51cd3

                                                      SHA1

                                                      c34b68ec7626ecb64a4afb9a95560999a064f6c5

                                                      SHA256

                                                      9b6bd8198b5d91c3d8e61ce4898b9892fa510ca8dbfb94178fceae2b1376379b

                                                      SHA512

                                                      397593688d5f2210993e49e56e18039079f694b613d7f9d22e3d7a62d657dc2a17f10ff18cb229c83ee241407683f26706e0f052d67a7d4c820cc74d233cbc9f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      17a460d63edcb179242d8d027a726782

                                                      SHA1

                                                      ebe6a3c813e3c52f00ae76023df1f1bdbdc16456

                                                      SHA256

                                                      c3db30e53570ae1f2d05b31bc35240cd0098997c25c687f8a29e0d3111ed9cbd

                                                      SHA512

                                                      8d13997cb86786614a6beb811d7ac5da4b773f6ecf96789a8226e38a86aa9746152866dab0bece2eef4e3a526bf6fa69dad254e1ed786ed12080d718dac5947d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ae0e3822-0128-4266-8463-4d9e0feabbe2.tmp

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      1136bafb54037dbb8691be380d3af1c1

                                                      SHA1

                                                      9565f5e57527ee2da71d8d9dd54e0feb32821f89

                                                      SHA256

                                                      025f3db297141c7502f82f1ab66e9fd839916278c44e597345122b3dfbb64927

                                                      SHA512

                                                      b62cd8c66f282db3131bd37a8bef95db936005332d6d884297951d646f2d4a652fb3ca4f01f79344393df00a10ddf05fe2eeab8da54f8934cd670a2411bfb891

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      13ee2efdd2939408bfbe00a5ee72885a

                                                      SHA1

                                                      66453d1b180f24913ccb39d4b966faca828d84dc

                                                      SHA256

                                                      bf49ae998fd39068be2610b6ab22edcd25005bf4621a0612a54a92c7ee50db3a

                                                      SHA512

                                                      31da2dee2c8435c5275aa91f181a6f37b168f1827675b6ede24a9b3f8b41c26a8cf93c9a89e5af3860799e1425d06702c02ee592618a9d2a9a7a253aa9e17663

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\activity-stream.discovery_stream.json.tmp

                                                      Filesize

                                                      25KB

                                                      MD5

                                                      c4188fe05e53d5577feef8b6bae72a00

                                                      SHA1

                                                      98abd71a96169ebbb0311ac7a6e633aaf90200ec

                                                      SHA256

                                                      9db4d6fce72ceede91e9e88445300a9ea0c79d32b78b70c6920b4399dbd598eb

                                                      SHA512

                                                      dcec7e6aa66027d6564b15915e36c6a7a9b855be89fc56a58832501e813032a262f684e4cca27aaea1285967d8d13de33b5a157829951d35da1ee6ad1aed65c9

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                                                      Filesize

                                                      13KB

                                                      MD5

                                                      c41c1777d629ed0a17e641f379d282ef

                                                      SHA1

                                                      1efeb92783dc1a2eaf1ac35aae14c0979dec5bfa

                                                      SHA256

                                                      a68c32854ad84d64191b74c375cb01e5cf2d926664f95115ddf85748b49dd9c5

                                                      SHA512

                                                      52e3b84ee967259f1e2d256300159c051bcebc1710471198fb5b4ef4846a33c4028e13cd80e8b5ee0ff81c026afb158c3198b4121fa5e4484da253cc530268e4

                                                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      33deaa408984ab9e79f4b7864feb75a3

                                                      SHA1

                                                      53f66d532cc556d29ded01b3cdfe3aae77cebf89

                                                      SHA256

                                                      9e8af7baa310ccecf5f0992dd6c2725f0da263779f7158209c9e927c054ef8bc

                                                      SHA512

                                                      786ea3d97cc400e83ac7d067d508b568be042a2c4f6232da18761feff236beea6f3d5cd800ba197030acf79086917e14c63013a1b59660b77c6b096dd4ed6d1e

                                                    • C:\Users\Admin\AppData\Local\Temp\1000020001\7fba472eae.exe

                                                      Filesize

                                                      89KB

                                                      MD5

                                                      7d94aa499d63578cdb0004ca9d696d9d

                                                      SHA1

                                                      b11b2a6763631d7170ef6b3e69ae196133f78901

                                                      SHA256

                                                      97c5fcf7e29d110aa1c65fec05a466db8d7e40c9aa9e4f362521be1439fab83c

                                                      SHA512

                                                      82157a71f7990294300c6129a395ecfaea7c80abcd02b873e4e44cb0295c9ea547a61c4259d3895f24f57c14a39b8470afb389eaed8895898510908075a3e83a

                                                    • C:\Users\Admin\AppData\Local\Temp\1000030001\ebf2bec0bb.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      644bc5da7c2b3f6c761e6e7e2a8b20d6

                                                      SHA1

                                                      7a169bc212a264daf59aac579824cc593c22da53

                                                      SHA256

                                                      e95fb4261f157fd17d5bc6e76da693aa1109de2a29f17522c6adb1f2416f1ee5

                                                      SHA512

                                                      19cb19923a007a21904af3c17390f3a26906d6aae87ec3f3d4bcd4bc60d80355bf67f9d4fb1ab3bd432b9532511073b9e7ba89025836406f9b1431dae1240fa7

                                                    • C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe

                                                      Filesize

                                                      187KB

                                                      MD5

                                                      dc4df67829d076c9c33c0d728a9a6ddb

                                                      SHA1

                                                      8362b7c722fcd493a473c0ad12c38c381f0c3e90

                                                      SHA256

                                                      b11d77860541c64edc90ba2b3841ce41913aada626bc56d6c10a9214f3040da8

                                                      SHA512

                                                      03da0637bf30b8d01591629b501b339b77e57b920e0cfd406222b0b28d81399e950da58f0088b7b7cf80cda49084b611056812618a586328232f9697f56e2ea2

                                                    • C:\Users\Admin\AppData\Local\Temp\CDC0.tmp\CDC1.tmp\CDD1.bat

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      de9423d9c334ba3dba7dc874aa7dbc28

                                                      SHA1

                                                      bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                      SHA256

                                                      a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                      SHA512

                                                      63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                      Filesize

                                                      479KB

                                                      MD5

                                                      09372174e83dbbf696ee732fd2e875bb

                                                      SHA1

                                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                                      SHA256

                                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                      SHA512

                                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                      Filesize

                                                      13.8MB

                                                      MD5

                                                      0a8747a2ac9ac08ae9508f36c6d75692

                                                      SHA1

                                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                      SHA256

                                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                      SHA512

                                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\AlternateServices.bin

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      d47ff3c4e40e2966b4a66bfaee954cca

                                                      SHA1

                                                      c4a9d9bf39ab5557e99058d6a71fa1ae9b680fb9

                                                      SHA256

                                                      9d33df037fc8f480cc105ea6705e9b60ffe325899a3a946454cdb1e33686bed1

                                                      SHA512

                                                      14a7e5428d85961e379d18a1db9308a690c9ef09d77ffa848fc3dd2ec83bac8d689323d75c7b7c51717eea89cdf86b83283865a71845a65d64eaf4144e40cb98

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\AlternateServices.bin

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      b95cdfa422aaa1e0118ff31bf2568538

                                                      SHA1

                                                      019790b4f439645f5b5ea9365c79196dd6902d97

                                                      SHA256

                                                      5df40057cef7ddb204f9a7d79e555f92753f5ea0f5548f8f62324a7c6fc50e5f

                                                      SHA512

                                                      2af290343fd87f78f7aade54de7833df632a584ebaaf7ea1ad6a89c7c19002f840b4cf8dd6290bfef0e4570b2e7ec35e9c062bce138c54bd1e5214159a3b7616

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      b01b38ba0f23e78cd0ec0cd7ed4ed840

                                                      SHA1

                                                      76d24d18dadc1a7840370793a1e75aea0bc7494f

                                                      SHA256

                                                      562050ee436e0f2a682a1477bea6bbf2f380f9cf26d014a0c01ad247670bce0a

                                                      SHA512

                                                      680314a03ac44f51d0761c1f2a972a32d8c70e2670479a7639ae96b9e41b304d49c22dcf3136fcf6057cc02080b3173afbae44a31da7694ee949debf0d7088ee

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      3dc4df1711aed3a209d287dab6558de2

                                                      SHA1

                                                      94418bebf0da80c8b1799b857e14981178243b99

                                                      SHA256

                                                      78864417ab51a2f82150be0f659cbdb81e83eb364c3171faa061411535bd22c6

                                                      SHA512

                                                      527d39cbf4dd1425672bfa52231fc0673114d98a9c8b47408e24e7ce4da7588386a9773f34d4ae3909d835be43c4faaf0270c99de444ca3c64d67cacc317205b

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\pending_pings\67ea4e06-6486-44c0-8243-cc8e333f1452

                                                      Filesize

                                                      982B

                                                      MD5

                                                      89c2ce108577c948012fd64823f13322

                                                      SHA1

                                                      bf26440160bd742a9f45ec14ed8dd2280c65a810

                                                      SHA256

                                                      20ddc846e1cb3919b0adc8bd29f000425d94deec66181f182bfb57350d222ba6

                                                      SHA512

                                                      d1d89b4f2799a3e148cf9ac3324ae5c74de9a4c1295de8fc4356e94d38b8764b68dd7179f4af8d06478f12f3c4d08729b22aa513ee9a88e8ad1551130a5ba05e

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\pending_pings\87c90e1a-69f5-4d73-a10a-0183a00d3273

                                                      Filesize

                                                      27KB

                                                      MD5

                                                      bd567389074f0f64fdb012677ffeae3b

                                                      SHA1

                                                      8ad11f8c14776a3c8d910f4d64dbc00fdf8b2d29

                                                      SHA256

                                                      b5e0dcb0d7bae8521f2f502cce0406958f11c41a07888cbd8ac0beb168c51c31

                                                      SHA512

                                                      bbbcb59f7a38455fe4d52121aefda41151ee192784638d7eba85583dc57738ed508e465ed1330d6fff3636202f6efa2c118a4406a00f9e637f010a0033dcbce0

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\datareporting\glean\pending_pings\90ccdb7d-aefc-41a3-9df5-64e0a0469e42

                                                      Filesize

                                                      671B

                                                      MD5

                                                      348e0d7c912545eab5910b256d7c6cfb

                                                      SHA1

                                                      741a4b656a532fc57d26a3a3fcdb98ac872abbc9

                                                      SHA256

                                                      018ae0ef4b274af599767fe2e69deb8257805737565cc24ad40179aabb1cc3c6

                                                      SHA512

                                                      d5f484bff9fa7a23cb8026c4b3508d420286ac4a7e1ab760da43f28eca511cf3ac03b4d1370b830be00bfa654739f1f0b2e16b4793e07cad82729acf5eaac040

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      842039753bf41fa5e11b3a1383061a87

                                                      SHA1

                                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                      SHA256

                                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                      SHA512

                                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                      Filesize

                                                      116B

                                                      MD5

                                                      2a461e9eb87fd1955cea740a3444ee7a

                                                      SHA1

                                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                                      SHA256

                                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                      SHA512

                                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                      Filesize

                                                      372B

                                                      MD5

                                                      bf957ad58b55f64219ab3f793e374316

                                                      SHA1

                                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                      SHA256

                                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                      SHA512

                                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                      Filesize

                                                      17.8MB

                                                      MD5

                                                      daf7ef3acccab478aaa7d6dc1c60f865

                                                      SHA1

                                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                                      SHA256

                                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                      SHA512

                                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\prefs-1.js

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      1cea05af5d4f529dcbab38bc144ec71c

                                                      SHA1

                                                      f9e1f0fc4377ebd6aa5462de9cfe0d92999c36b1

                                                      SHA256

                                                      4c3da5c41cc475f547a55cb256c6c2499809bbef1257d7178c4b282a85765a0d

                                                      SHA512

                                                      8b1977f27c22dadf6de0fb7eaec528c79176e9eca60492a15e718432a0f25d4f2631e4421cf73d1ced04e02b3f4bdd8e19616ddfe13d11ac8c15a12ba41368aa

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\prefs-1.js

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      c8a60febac6eca980d2cb19eae4aabf5

                                                      SHA1

                                                      4da3cb617ebf88467fb0808c3efbdd8093a1916f

                                                      SHA256

                                                      900c7121560b9abdafe664a30d5815bd55e34db1b98d365c7a9adb926f530700

                                                      SHA512

                                                      231d800343c88c41ccac84ab97ae8f15735353d60e21a9ce51cd531493f54aa09ac49e100de9da902324b65f994b38cd2bd2c507dffbd3825ace8a4ec05a67b9

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\prefs-1.js

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      06a8ca28b8eacb0c888c17fc8b4c19c3

                                                      SHA1

                                                      39aaaa0304fcc0668ddb8ebf59c98760f692e622

                                                      SHA256

                                                      8824e4d689a329b54450c1535fe3ba0d35cf338e455b29d4c151d78dd7657e89

                                                      SHA512

                                                      ecd725d2664560d790175e9f7346e77a7c3f5f0174b668818d5c8311b15e55d52d9927500b2514fd89444d76df1d90f41f23162dec053b8c81541f358df3e091

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vcc2x7ul.default-release\prefs.js

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      e2d4de6a79b640ad113a48b26bb2c560

                                                      SHA1

                                                      8a2d5ef34fd281ff2613a62a3fae0b96faab002f

                                                      SHA256

                                                      10e75f0353f587c492d7efc6f24c7d1a5e5881e81eedb73309190b2a2180fcba

                                                      SHA512

                                                      f262967d728cf8a7ea1a0d8a37ae3868403448a7035fbc4eae23cf9dd169efaa6586ccc98b0e933c9e6c4538201ceeee9328ffb71278bc1ad64430b2eaa1b0ee

                                                    • memory/2352-2941-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/2352-2944-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/2772-3017-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/2772-3013-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/2824-2968-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-3009-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2896-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2957-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2946-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2998-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-677-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2979-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2162-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2905-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-1421-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-2936-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2824-3028-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/3180-543-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3180-542-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-19-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-480-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2397-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2895-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-562-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-21-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2907-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-22-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-18-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-621-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-1544-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2937-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-3010-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2999-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-859-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-536-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2980-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2969-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2956-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-20-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3904-2958-0x0000000000840000-0x0000000000CD9000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4292-2945-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/4292-2940-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/4328-2897-0x00000000006F0000-0x0000000000933000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/4328-863-0x00000000006F0000-0x0000000000933000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/5012-3-0x00000000008B0000-0x0000000000D49000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/5012-4-0x00000000008B0000-0x0000000000D49000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/5012-2-0x00000000008B1000-0x00000000008DF000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/5012-17-0x00000000008B0000-0x0000000000D49000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/5012-0-0x00000000008B0000-0x0000000000D49000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/5012-1-0x00000000779F4000-0x00000000779F6000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/5512-675-0x00000000008B0000-0x0000000000D68000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/5512-622-0x00000000008B0000-0x0000000000D68000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/6252-3014-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/6252-3018-0x0000000000EA0000-0x0000000001358000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/6988-535-0x0000000000400000-0x00000000031F0000-memory.dmp

                                                      Filesize

                                                      45.9MB

                                                    • memory/6988-533-0x0000000000400000-0x00000000031F0000-memory.dmp

                                                      Filesize

                                                      45.9MB