Analysis

  • max time kernel
    117s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 05:06

General

  • Target

    324d93ead119e4313f6f81696eeaf7f9.exe

  • Size

    1.8MB

  • MD5

    324d93ead119e4313f6f81696eeaf7f9

  • SHA1

    42af7724e7c738fbf387f2c6f5fb428c2e0686aa

  • SHA256

    4341e8171f70008e0dc7c6309ea60371cc68e29ad7ee457914f5bf676fd30c3d

  • SHA512

    96c8056c6756441ccd5326785792b93246e51ce1587c7314c5b16679345d04a4470e3103b40ccc6a04b8478dce2b2ad15c9f2ab1307fc593556ee0a4af66fde2

  • SSDEEP

    49152:UxSZP+P67T+A69IBdQqdigMCw3bPzJER2NtKZGLJeAIEj:UxSU67T+APkg9wSatKA8ZI

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@LOGSCLOUDYT_BOT

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://racedsuitreow.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 10 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 40 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 47 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 30 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 53 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\324d93ead119e4313f6f81696eeaf7f9.exe
        "C:\Users\Admin\AppData\Local\Temp\324d93ead119e4313f6f81696eeaf7f9.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:1920
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                PID:1932
            • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe
              "C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1836
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                  PID:1660
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3044
                  • C:\Users\Admin\AppData\Roaming\izhEFwHe7P.exe
                    "C:\Users\Admin\AppData\Roaming\izhEFwHe7P.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:964
                  • C:\Users\Admin\AppData\Roaming\CNFrUAr16W.exe
                    "C:\Users\Admin\AppData\Roaming\CNFrUAr16W.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2004
              • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
                "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of FindShellTrayWindow
                PID:360
                • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                  "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2024
                  • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    PID:2108
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:5188
              • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:1464
              • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
                "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:2184
                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                  C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2564
              • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
                "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2368
              • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe
                "C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:1972
              • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe
                "C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:3040
              • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe
                "C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"
                4⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2072
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                  5⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2696
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    6⤵
                    • Enumerates processes with tasklist
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1000
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "wrsa opssvc"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2524
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    6⤵
                    • Enumerates processes with tasklist
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2932
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2940
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 607698
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1640
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V "MaskBathroomCompositionInjection" Participants
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2752
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1592
                  • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                    Waters.pif Q
                    6⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2036
                  • C:\Windows\SysWOW64\choice.exe
                    choice /d y /t 5
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:3008
              • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
                "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:2396
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  5⤵
                    PID:1320
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1568
                • C:\Users\Admin\AppData\Local\Temp\1000308001\a7d40b0143.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000308001\a7d40b0143.exe"
                  4⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2408
                • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1320
                • C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2708
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:9364
                • C:\Users\Admin\AppData\Local\Temp\1000321001\2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000321001\2.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  PID:2312
                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                    5⤵
                      PID:8680
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                      5⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:8724
                  • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:968
                    • C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe
                      "C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe"
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5660
                  • C:\Users\Admin\AppData\Local\Temp\1000336001\XM.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000336001\XM.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1152
                  • C:\Users\Admin\AppData\Local\Temp\1000337001\23c60fb4ad.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000337001\23c60fb4ad.exe"
                    4⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    PID:2588
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                      5⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2944
                      • C:\Users\Admin\AppData\Local\Temp\1000002001\dd527634fc.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000002001\dd527634fc.exe"
                        6⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:9500
                      • C:\Users\Admin\AppData\Local\Temp\1000004101\0811fd4f83.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000004101\0811fd4f83.exe"
                        6⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:9728
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                          7⤵
                            PID:9748
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                              8⤵
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:9768
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9768.0.1800734541\1072619984" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1160 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fadb4646-b0d8-4ba4-8f47-2ad4ec710e7f} 9768 "\\.\pipe\gecko-crash-server-pipe.9768" 1348 f5f0558 gpu
                                9⤵
                                  PID:1804
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9768.1.1642413210\1031694871" -parentBuildID 20221007134813 -prefsHandle 1528 -prefMapHandle 1524 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a73018b1-51dc-4170-983d-b50e51377777} 9768 "\\.\pipe\gecko-crash-server-pipe.9768" 1556 f5ed558 socket
                                  9⤵
                                    PID:548
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9768.2.1372655498\153351339" -childID 1 -isForBrowser -prefsHandle 2128 -prefMapHandle 2124 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a66b445b-405c-4393-aaba-804cf5a1657c} 9768 "\\.\pipe\gecko-crash-server-pipe.9768" 2140 d65658 tab
                                    9⤵
                                      PID:2560
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9768.3.590573909\163356094" -childID 2 -isForBrowser -prefsHandle 2360 -prefMapHandle 2356 -prefsLen 21709 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec3c1ed8-c0ee-41b2-9cdf-21b57e6f5b4f} 9768 "\\.\pipe\gecko-crash-server-pipe.9768" 2372 19e7c458 tab
                                      9⤵
                                        PID:2116
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9768.4.924498677\1871536785" -childID 3 -isForBrowser -prefsHandle 2684 -prefMapHandle 2680 -prefsLen 21709 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {258721f2-0b6f-482c-b319-a07d8b5fb756} 9768 "\\.\pipe\gecko-crash-server-pipe.9768" 2696 19e7df58 tab
                                        9⤵
                                          PID:3088
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9768.5.2107762359\423407308" -childID 4 -isForBrowser -prefsHandle 3248 -prefMapHandle 3244 -prefsLen 26138 -prefMapSize 233414 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58f1f0f7-902d-45cb-a323-239b7f3d43d6} 9768 "\\.\pipe\gecko-crash-server-pipe.9768" 3260 1b443d58 tab
                                          9⤵
                                            PID:3716
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                        7⤵
                                          PID:9804
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                            8⤵
                                            • Checks processor information in registry
                                            PID:9812
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9812.0.953827205\1932895353" -parentBuildID 20221007134813 -prefsHandle 1048 -prefMapHandle 1040 -prefsLen 17556 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {31df6f7a-6659-4fcc-af68-12c58cc03b62} 9812 "\\.\pipe\gecko-crash-server-pipe.9812" 1164 40d8958 gpu
                                              9⤵
                                                PID:3272
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="9812.1.1797253730\1043424756" -parentBuildID 20221007134813 -prefsHandle 1308 -prefMapHandle 1304 -prefsLen 17601 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e489d459-9211-44ee-b6eb-32c63084e431} 9812 "\\.\pipe\gecko-crash-server-pipe.9812" 1320 4346c58 socket
                                                9⤵
                                                  PID:3368
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                              7⤵
                                                PID:10236
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                  8⤵
                                                  • Checks processor information in registry
                                                  PID:2208
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                7⤵
                                                  PID:2008
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                    8⤵
                                                    • Checks processor information in registry
                                                    PID:2808
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                  7⤵
                                                    PID:5176
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                      8⤵
                                                      • Checks processor information in registry
                                                      PID:5184
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5184.0.331755299\797177063" -parentBuildID 20221007134813 -prefsHandle 1072 -prefMapHandle 1064 -prefsLen 17556 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e365b402-3530-41b0-917c-1b5f15a4c35e} 5184 "\\.\pipe\gecko-crash-server-pipe.5184" 1136 f6f1a58 gpu
                                                        9⤵
                                                          PID:5492
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5184.1.1452857698\399626886" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1248 -prefsLen 17601 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49a9c2b5-a039-4a9f-8757-16aa4b098492} 5184 "\\.\pipe\gecko-crash-server-pipe.5184" 1268 fb3fa58 socket
                                                          9⤵
                                                            PID:5516
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                        7⤵
                                                          PID:5304
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                            8⤵
                                                            • Checks processor information in registry
                                                            • Modifies registry class
                                                            PID:5308
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.0.736097650\195058871" -parentBuildID 20221007134813 -prefsHandle 1168 -prefMapHandle 1128 -prefsLen 20950 -prefMapSize 233518 -appDir "C:\Program Files\Mozilla Firefox\browser" - {78f13c75-edda-4fc1-8639-3479c3f4e305} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 1276 12a96758 gpu
                                                              9⤵
                                                                PID:6172
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.1.1309218428\2134150042" -parentBuildID 20221007134813 -prefsHandle 1460 -prefMapHandle 1456 -prefsLen 21811 -prefMapSize 233518 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5634bfa7-7a74-4177-86d2-8dc7c6207dff} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 1488 ebeb858 socket
                                                                9⤵
                                                                  PID:6300
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.2.746754970\1965545113" -childID 1 -isForBrowser -prefsHandle 2004 -prefMapHandle 2000 -prefsLen 21849 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4371cd64-e9b4-46e4-b231-c1cd3fbc574f} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 2016 192ba458 tab
                                                                  9⤵
                                                                    PID:6496
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.3.929476662\103904215" -childID 2 -isForBrowser -prefsHandle 2660 -prefMapHandle 2656 -prefsLen 26262 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d98ff10b-adaf-4b9f-bb81-b479f64154a2} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 2672 1b7c8758 tab
                                                                    9⤵
                                                                      PID:6824
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.4.1731342922\1921135797" -childID 3 -isForBrowser -prefsHandle 2980 -prefMapHandle 2960 -prefsLen 26321 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4078bc6e-e234-42ae-bdc5-a5b3c4ffdad2} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 3548 e6bb58 tab
                                                                      9⤵
                                                                        PID:7256
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.5.1283328810\1302852276" -childID 4 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 26321 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ee69e6c-55f9-4646-9861-f50634d92ec0} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 3984 1fb55d58 tab
                                                                        9⤵
                                                                          PID:7784
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.6.1224874796\637354578" -childID 5 -isForBrowser -prefsHandle 3544 -prefMapHandle 3884 -prefsLen 26321 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a71b334-372f-4ab5-a1f4-709a57ab7095} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 2360 1b51cb58 tab
                                                                          9⤵
                                                                            PID:8592
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.7.684740591\1744236532" -childID 6 -isForBrowser -prefsHandle 3380 -prefMapHandle 3384 -prefsLen 26321 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {476936af-2246-4c4a-8b4b-e436d39b6486} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 3376 1b7c9658 tab
                                                                            9⤵
                                                                              PID:8600
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5308.8.1712967236\1038826016" -childID 7 -isForBrowser -prefsHandle 4348 -prefMapHandle 4352 -prefsLen 26321 -prefMapSize 233518 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {599e8018-a2ec-489f-a972-4615f3e580b4} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" 4336 1b7c7258 tab
                                                                              9⤵
                                                                                PID:8616
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                                            7⤵
                                                                              PID:5704
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                                                8⤵
                                                                                • Checks processor information in registry
                                                                                PID:5836
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000008141\blo.ps1"
                                                                            6⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:9948
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                                              7⤵
                                                                                PID:6124
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                                                  8⤵
                                                                                  • Checks processor information in registry
                                                                                  PID:6188
                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jel5elvf.cmdline"
                                                                                7⤵
                                                                                  PID:7364
                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A94.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8A93.tmp"
                                                                                    8⤵
                                                                                      PID:8356
                                                                                • C:\Users\Admin\1000015002\ddc1fff9ed.exe
                                                                                  "C:\Users\Admin\1000015002\ddc1fff9ed.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:10160
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1480
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:1768
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                                                          2⤵
                                                                          • Drops startup file
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2328
                                                                      • C:\Windows\system32\taskeng.exe
                                                                        taskeng.exe {0C5BFDAC-C968-4E32-84E1-FA5D3AD042EB} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]
                                                                        1⤵
                                                                          PID:5324

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                          Filesize

                                                                          342B

                                                                          MD5

                                                                          4a777151b5bde5ad446d09242cc12ba0

                                                                          SHA1

                                                                          e3f9dc49310f74b19a024d10a6fed1c270606c39

                                                                          SHA256

                                                                          257ec6f680b688a8e0bede0ac64e20beb85328f1fbd4c5be392a9aa0cc09797d

                                                                          SHA512

                                                                          9ba3fbfe673a7628ffa9e8aa3458c613d02fddba74868cb6d6f3a6ab8cd17d1eaffc8c1c8fd79fda3d6c7161b75c161fce3929367a23f9713adb3b011f085ab2

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQU8S4LJ\FeelingSurfViewer[1].htm

                                                                          Filesize

                                                                          266B

                                                                          MD5

                                                                          3eda085f54c36301dd84e497b0af42ef

                                                                          SHA1

                                                                          5f2a47606f6ba0e0e1ee2bacbb41448e4214887d

                                                                          SHA256

                                                                          2a2ed0f340ddf4bb2c6f55c3b519c1198cabc687d229ee0e1fbffffb93aa5bcc

                                                                          SHA512

                                                                          7bc226691057ea92334e0ed84842777a031f19bc6e2680bc7fc9dea40afc41a4a9d9f112b7d1b894bd82c8c29bde40b356b74efd5d3f21864e10c78e71b06d99

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\activity-stream.discovery_stream.json.tmp

                                                                          Filesize

                                                                          35KB

                                                                          MD5

                                                                          86163752a3e8563c6d4e903448d1b4dd

                                                                          SHA1

                                                                          3d0a48dcc9090ec794f4a6f1f6dc39462dc6fc73

                                                                          SHA256

                                                                          35a3e2c65c56badf53f591b95ac37f78ed18285e184256e02ff1bfe1fcc2425e

                                                                          SHA512

                                                                          20c861b6b68b67b8c52f09d7095f2c8a8a4d2a3bae0aab2a72d2107768a6bddb94b97feca6f87da9ba1e7e669600290cd7e4c0b76babdcf871e1e95c27d8b04d

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\22386449CA13D8975B935875780066C6EF52CE37

                                                                          Filesize

                                                                          13KB

                                                                          MD5

                                                                          958c520088bdd2c3611aece9ddfa3f46

                                                                          SHA1

                                                                          8fa09a9c3177f1555b1913e0ff26b2f5e53aaefc

                                                                          SHA256

                                                                          eee522779a57f7232decbdb3742ed595048d75197c35dcf6178087f447a9b720

                                                                          SHA512

                                                                          5f8ce47dabe3ac48a248a84e696c2f2a4fb759bce0df1ecfaaea3fa8953244426dc1ac7245f4296ae586710c61d8bc869f08e01332f66cbc085c02b7977a0460

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\231F6B263D5AE6E66E1C79EA4CCE5FFA71CAAF7A

                                                                          Filesize

                                                                          95KB

                                                                          MD5

                                                                          bc6e1434235a03dbd1c958cbc702e991

                                                                          SHA1

                                                                          23f05bf70ddfbc3c98277ec59c01b66074cf91cc

                                                                          SHA256

                                                                          516da9603db548864b23c122b8c036f37b2d820dc1edbe947d71569219849cd9

                                                                          SHA512

                                                                          58570026009f95c5b65b644df87a8be832e123d46e200abc5729499bb0a6d3b6a4cb54831128425933c75358a39d00d245f11f00d365f13e02f4d3c4b271d8ed

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\3F6BAE390F7FB4267066C23DBD35348B57989359

                                                                          Filesize

                                                                          293KB

                                                                          MD5

                                                                          6a94b344df24bc2ee7bbd56cc5d3d12c

                                                                          SHA1

                                                                          e55fe99b2b1ae5f17ef7088428c78f6dc5affc94

                                                                          SHA256

                                                                          8ea36b336b6d365781e1c3e00ce2c6e1d9ddaed736f33a9658cdb0c11d5ca3a4

                                                                          SHA512

                                                                          81a401379f07c226f98ac753ab7260cca2f8eb392cddd9d37ba06b139fd77fedf8bff0854e2a74a2bd4d0fe5acb6a6da34de31dc4c2dcfe794d8d5f036bc44dd

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\6A9401069D7CA26FCDC6674AD30D2A279D87FE98

                                                                          Filesize

                                                                          23KB

                                                                          MD5

                                                                          036b09d2d87cb174f14dcea4673d3e80

                                                                          SHA1

                                                                          99ae97ab490917650d3505a99565203bdc6e38f1

                                                                          SHA256

                                                                          4d935c4f5a380d74f3e0329848fc650d06628f02ed3752ae372db3fc0ef34139

                                                                          SHA512

                                                                          3a39363d4a12482e487d19ce1ba2c0d99f71be3487cf79d73d411ff69650e841cccc9bbd9c72f7400223690888ff50bdaf49e38abbc9c70e25bfb1ea40d6c39b

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\6C83C5B984D14EE39D04C8596635F6E1ED261FE2

                                                                          Filesize

                                                                          274KB

                                                                          MD5

                                                                          08fb4df1e9ff8d60683567ff463aee6d

                                                                          SHA1

                                                                          d30f95240b082e666a8bc589635b1aa50ad9198a

                                                                          SHA256

                                                                          ddd51a2e278ec7319bc8b31672a7d18432992f1efab5cee93275e70cc3e2da6c

                                                                          SHA512

                                                                          16beea9b058058279b3132418cfad64908321e22f42784432a48073cc405ea69b6ee1d924384ff31cc0023a707877f115c3d521cf29af715e00406bf2aa7ce91

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\81CD511D19DC9AD6DF4BCD4C457A3E930E977A0B

                                                                          Filesize

                                                                          131KB

                                                                          MD5

                                                                          2ad956f4d5d9048cea0e9fb9cc3fa10a

                                                                          SHA1

                                                                          741d1c9cf1b62b1ab55e3d9725c78ceaf1b09620

                                                                          SHA256

                                                                          d08dfedeb54fe0a34b323bf3618a7df4af47b30fb039a2b46874606889da62ce

                                                                          SHA512

                                                                          1ea6d5c0054f5d279b6063c8b9b96de54de5483276fa1b61824beefd258f2db2993fd94094167e4d7048151e4121ece102168f3b4871f070ef8838d4c92e27b1

                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\cache2\entries\8925273EBDD43647D40B934B2431DB346A4F7098

                                                                          Filesize

                                                                          768KB

                                                                          MD5

                                                                          0c4697a786e19c810d240738402d2544

                                                                          SHA1

                                                                          9b9c2fa7c8252ec3ee9088fff83ea92466fcb8ef

                                                                          SHA256

                                                                          7bdf14b219e2a151559a0fe5a759a53c773f3d1edc2613d629e12f4c26fe7524

                                                                          SHA512

                                                                          fcd7ad4c1cbb321a7ecbde95158f981de42ecb97b55f2627ad518655136e515c39dce820c2bd2d2e9eca9b2ad3255540b27f81cc84b2186b4b4d51546af16966

                                                                        • C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr

                                                                          Filesize

                                                                          872KB

                                                                          MD5

                                                                          18ce19b57f43ce0a5af149c96aecc685

                                                                          SHA1

                                                                          1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                          SHA256

                                                                          d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                          SHA512

                                                                          a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                          Filesize

                                                                          312KB

                                                                          MD5

                                                                          389881b424cf4d7ec66de13f01c7232a

                                                                          SHA1

                                                                          d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                                                          SHA256

                                                                          9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                                                          SHA512

                                                                          2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          6c9e7815208530b2574368f8a70e5790

                                                                          SHA1

                                                                          61d5d998abbbfe9c6efd9d38b8c99a3b48f8a7de

                                                                          SHA256

                                                                          c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782

                                                                          SHA512

                                                                          013b6ce1104d05cdd4587197c4e177ef13409db9c81084551450674833d3876a050035a4545a647a257538a2cb44aafaada534c9bfe8e2b5bcf6a9f2dcff134d

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000004101\0811fd4f83.exe

                                                                          Filesize

                                                                          900KB

                                                                          MD5

                                                                          3a7ddc76449ad883dec9ec0b7403f184

                                                                          SHA1

                                                                          2ebc330233fb1a0b090e7a0e21e86d962e4a09d5

                                                                          SHA256

                                                                          9192979001c860ed13f4f49a8a9b9703153eed270cf1282579c5e005edc65d98

                                                                          SHA512

                                                                          0488d1f108bbbb07050d0dfba5c8b94361f11ee53f2198649a9379ed1bcf052c022273b1356d73518ca19587cf4064fab9888c520d6ff97d4fee95af8a8c2e4d

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                          Filesize

                                                                          416KB

                                                                          MD5

                                                                          f5d7b79ee6b6da6b50e536030bcc3b59

                                                                          SHA1

                                                                          751b555a8eede96d55395290f60adc43b28ba5e2

                                                                          SHA256

                                                                          2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                          SHA512

                                                                          532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000008141\blo.ps1

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          90019cfd00d043c3f6da5719cd344c62

                                                                          SHA1

                                                                          034bd2d68f4ec66b227ab7d31d2135e28d75b131

                                                                          SHA256

                                                                          1401c46006791e4d0fea52e9e98991df542eb0a24c50da4856f4ac1eda5cd4ec

                                                                          SHA512

                                                                          7e00c5eade73a95225f71574b48d66e19241943f47732ed4d352440e6fcfc7c44b8cc4bdfeaa51b04f7bb16b3a4cc2005e1a4b71c578c4dd0399fabbe997b1f2

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe

                                                                          Filesize

                                                                          6.3MB

                                                                          MD5

                                                                          2426fa19f0c2cc5de92d6ef43337c2d1

                                                                          SHA1

                                                                          97b742a006365ad06a8d0933da8d72c51cca8e63

                                                                          SHA256

                                                                          4d10776348522e720fd36f175f9f735039e4aa3ae9543886320cd75e45e77754

                                                                          SHA512

                                                                          e6dfea55d923c4fa9a6e2e1d9dfa63ec1a5a4b34ce652dbed7b1442f92e628a18d7734128c735757665e07ceb4ca1fff891bea816925177462181242c6075690

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                          Filesize

                                                                          187KB

                                                                          MD5

                                                                          7a02aa17200aeac25a375f290a4b4c95

                                                                          SHA1

                                                                          7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                          SHA256

                                                                          836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                          SHA512

                                                                          f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                          Filesize

                                                                          4.1MB

                                                                          MD5

                                                                          7fa5c660d124162c405984d14042506f

                                                                          SHA1

                                                                          69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                          SHA256

                                                                          fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                          SHA512

                                                                          d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                          Filesize

                                                                          494KB

                                                                          MD5

                                                                          6760374f17416485fa941b354d3dd800

                                                                          SHA1

                                                                          d88389ec19ac3e87bc743ba3f8b7c518601fdbf9

                                                                          SHA256

                                                                          9dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5

                                                                          SHA512

                                                                          6e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe

                                                                          Filesize

                                                                          454KB

                                                                          MD5

                                                                          37d198ad751d31a71acc9cb28ed0c64e

                                                                          SHA1

                                                                          8eb519b7a6df66d84c566605da9a0946717a921d

                                                                          SHA256

                                                                          1ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde

                                                                          SHA512

                                                                          60923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe

                                                                          Filesize

                                                                          673KB

                                                                          MD5

                                                                          b859d1252109669c1a82b235aaf40932

                                                                          SHA1

                                                                          b16ea90025a7d0fad9196aa09d1091244af37474

                                                                          SHA256

                                                                          083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                                          SHA512

                                                                          9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe

                                                                          Filesize

                                                                          1.3MB

                                                                          MD5

                                                                          2b01c9b0c69f13da5ee7889a4b17c45e

                                                                          SHA1

                                                                          27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                          SHA256

                                                                          d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                          SHA512

                                                                          23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                          Filesize

                                                                          314KB

                                                                          MD5

                                                                          ff5afed0a8b802d74af1c1422c720446

                                                                          SHA1

                                                                          7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                          SHA256

                                                                          17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                          SHA512

                                                                          11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000308001\a7d40b0143.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          58883b106a8e85025ddff83a48670669

                                                                          SHA1

                                                                          59aa6f964346383af028372e21ad7e9d2eb054e9

                                                                          SHA256

                                                                          d2f8bd4baf67c8a557e21303ca035fd9a712202ca6d1a2f78edeb5af27918079

                                                                          SHA512

                                                                          b621635bdf06980fbd52347c9cefb5c32a61d0008553690e6a85886763f9acd44d60211cbddb4d9890f55b657af3c16b232bdf16490832257ab7b0fdf383b253

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                                                          Filesize

                                                                          352KB

                                                                          MD5

                                                                          2f1d09f64218fffe7243a8b44345b27e

                                                                          SHA1

                                                                          72553e1b3a759c17f54e7b568f39b3f8f1b1cdbe

                                                                          SHA256

                                                                          4a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2

                                                                          SHA512

                                                                          5871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe

                                                                          Filesize

                                                                          10.3MB

                                                                          MD5

                                                                          489f9c4fc0afa8d1be37bc5e2f57833b

                                                                          SHA1

                                                                          c2bac602a73c19b345b64e0b7cf2f837be307b61

                                                                          SHA256

                                                                          d9dbfbc8294cbf6a32d43413ed328594ee058d7356c26eb5cd196f9f4867c078

                                                                          SHA512

                                                                          7f43d972f58a025d09143c57351221fe7b10c1756a0c5578ac42698c21ea05986d4bbc0c7ff4be339c2d0930b505e4f4dda53c0800d84b059a21be938adb678e

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000321001\2.exe

                                                                          Filesize

                                                                          6.4MB

                                                                          MD5

                                                                          f66beee3aae7cd92f02270a910b70231

                                                                          SHA1

                                                                          f8f1ce1dde9118e6d40426256756a201be9b0f65

                                                                          SHA256

                                                                          a89687d296782db168a92a496fb865d481666cf53588684f69ecac509711da16

                                                                          SHA512

                                                                          635b89682a25f6c64d4af69d6afebca753e6b0595edf5585231e7daa53778ceccd24d36783026e9785245cc9d14aebaf2fa4ca179f5eaefbd966a92140790480

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe

                                                                          Filesize

                                                                          304KB

                                                                          MD5

                                                                          58e8b2eb19704c5a59350d4ff92e5ab6

                                                                          SHA1

                                                                          171fc96dda05e7d275ec42840746258217d9caf0

                                                                          SHA256

                                                                          07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                                                          SHA512

                                                                          e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000336001\XM.exe

                                                                          Filesize

                                                                          702KB

                                                                          MD5

                                                                          0940599cefe789664d6a032a27b25b73

                                                                          SHA1

                                                                          c6ee1fe58fdd7ba3c3f3d0e708228e53050cf4fa

                                                                          SHA256

                                                                          ed42c5f70c10694c1376f330cfbdcee52b72aed3b7eb25debcc1b2ba613c0922

                                                                          SHA512

                                                                          47c01da51b42cb086202d05f01613d81b75e37a8b718f13597a18d8693e3a6f8666d28d9c79abcd143d1d3c93d7a4051e551f4354306a7b57507967bc9adf781

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000337001\23c60fb4ad.exe

                                                                          Filesize

                                                                          1.9MB

                                                                          MD5

                                                                          3864d645d16917d8368b5a36028692c4

                                                                          SHA1

                                                                          c3c9ea2456680620ed20a6800de133780ae4be36

                                                                          SHA256

                                                                          cebefb2613a8a479d83ff4f6cf8492510dc597727dbb8956f71ddd1fa52b4194

                                                                          SHA512

                                                                          f697a53f3302fee41d33bc7c6bce87fa91065b7f5578bc27e38fa5fb60ffac5cb56f440115a5ee87b1db9076d3cf1f29694c4e5866bd3e8d8eda9c2f29316dfd

                                                                        • C:\Users\Admin\AppData\Local\Temp\CabF337.tmp

                                                                          Filesize

                                                                          70KB

                                                                          MD5

                                                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                                                          SHA1

                                                                          1723be06719828dda65ad804298d0431f6aff976

                                                                          SHA256

                                                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                          SHA512

                                                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                        • C:\Users\Admin\AppData\Local\Temp\Emotions

                                                                          Filesize

                                                                          19KB

                                                                          MD5

                                                                          b98d78c3abe777a5474a60e970a674ad

                                                                          SHA1

                                                                          079e438485e46aff758e2dff4356fdd2c7575d78

                                                                          SHA256

                                                                          2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

                                                                          SHA512

                                                                          6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

                                                                        • C:\Users\Admin\AppData\Local\Temp\Participants

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          f0e725addf4ec15a56aa0bde5bd8b2a7

                                                                          SHA1

                                                                          1f54a49195d3f7fd93c5fec06cc5904c57995147

                                                                          SHA256

                                                                          7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

                                                                          SHA512

                                                                          00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

                                                                        • C:\Users\Admin\AppData\Local\Temp\Rick

                                                                          Filesize

                                                                          869KB

                                                                          MD5

                                                                          e0d37e7b879f4b4e0dde5006da5009bd

                                                                          SHA1

                                                                          33d19bdb8a0ae45a38ab6899381ca8bc1ea7c1a5

                                                                          SHA256

                                                                          27014daa44b8b92e1684970350c43bb1701d3a592572e650e1e00be1470e5f77

                                                                          SHA512

                                                                          68b2f357b3f02f3181df095ddc6fe8ff1810a150e832c245e428f973a096301b1d13fce00ad28af662c4aea371f872d56348fe7b5d2070ed3f1c49388efd3f60

                                                                        • C:\Users\Admin\AppData\Local\Temp\TarF607.tmp

                                                                          Filesize

                                                                          181KB

                                                                          MD5

                                                                          4ea6026cf93ec6338144661bf1202cd1

                                                                          SHA1

                                                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                          SHA256

                                                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                          SHA512

                                                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                        • C:\Users\Admin\AppData\Local\Temp\TmpCB3C.tmp

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          1420d30f964eac2c85b2ccfe968eebce

                                                                          SHA1

                                                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                          SHA256

                                                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                          SHA512

                                                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                        • C:\Users\Admin\AppData\Local\Temp\file1.dll - Shortcut.lnk

                                                                          Filesize

                                                                          723B

                                                                          MD5

                                                                          5cf5039cd6888ae25df5e853c2ffccb1

                                                                          SHA1

                                                                          057b6d229c2d35d7af7298f5fc9a187ef1815c04

                                                                          SHA256

                                                                          3fe08e075a284cf5adc82fddde7a9025fafe7e8eb0498d2d6667054a385f6d30

                                                                          SHA512

                                                                          12722f539c8a1361f2585e7049fbc64f00c5f9b4964f92ea15b0c4405708c59aa3bc4a61c9afd83a61718ce262f0d1f515ef1643a8ede7b097604c78898cdf74

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                          Filesize

                                                                          442KB

                                                                          MD5

                                                                          85430baed3398695717b0263807cf97c

                                                                          SHA1

                                                                          fffbee923cea216f50fce5d54219a188a5100f41

                                                                          SHA256

                                                                          a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                          SHA512

                                                                          06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                          Filesize

                                                                          8.0MB

                                                                          MD5

                                                                          a01c5ecd6108350ae23d2cddf0e77c17

                                                                          SHA1

                                                                          c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                          SHA256

                                                                          345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                          SHA512

                                                                          b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                        • C:\Users\Admin\AppData\Roaming\CNFrUAr16W.exe

                                                                          Filesize

                                                                          304KB

                                                                          MD5

                                                                          12f13e368d8f8a329c94302ca0bd5d8a

                                                                          SHA1

                                                                          17fdaeb0122b61c702ec7a4c809fc26ca4cb73bf

                                                                          SHA256

                                                                          570aaaf62baff05ca992f53356044c86f85f46014451b85f8306915fef498a24

                                                                          SHA512

                                                                          031c116d0fe92912363eb7e580dea59504d4de5ac4fc51a1cf8d85393585c0acc712256142a88d33ebdf5b616068ca02066806cea6f4c0072a50f0b0144440da

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-457978338-2990298471-2379561640-1000\76b53b3ec448f7ccdda2063b15d2bfc3_7ab03691-fc7c-4787-903d-423aed4b9dc2

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          383978f67add400c34bffcfa5d88343e

                                                                          SHA1

                                                                          434e211b9176a47c23baf16c8a98fe024effbdb8

                                                                          SHA256

                                                                          23fc627dbbfda0489ed374c4e5b69920d039404115d4ba5f2223cc538602d961

                                                                          SHA512

                                                                          0b786e7d1b38e1f6a22a3f9842a2df4a16384cbc50b92f9feb9922c36e21971a526fd91d5bdaf0278b2f03be8fd4184c699f781bbe8ceda2b21308dc3b910204

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          e221e58e4fa1f2ec11c4c3f0bd13639f

                                                                          SHA1

                                                                          a8c4b93b42304f1fe4484d1994cfcf674fa55bc7

                                                                          SHA256

                                                                          84a69bdd777d3e5ad46e392d4c5f96ed9e6f43b720826546dceeeb9d5afc6ec7

                                                                          SHA512

                                                                          44226575b05f73bceffb49b872e7afc72839fd9a085d960065feeb8b1fb79159fcb4863e2c5b7722d5918f1860555713e981ce214b7370da318ced2336d50787

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          06980e98cc49cb7ff7eef4c6e51173a9

                                                                          SHA1

                                                                          b573d8f6db3f7d8da45e9e83cde642db29250325

                                                                          SHA256

                                                                          e30c79280e9f6a068b3402e6be0abc09836b007a49586bce1c95bbbd5b6011db

                                                                          SHA512

                                                                          cbead6b9e56ad5550bd19cfc58459bc0b2474a7f389071309fce853737e3b640cf528e517fd97ae4956f1747733ae0e945caf04dd66c5f2f1c362f173e188637

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\datareporting\glean\pending_pings\017f33b6-2199-4b44-bfbf-2ae0cc744786

                                                                          Filesize

                                                                          745B

                                                                          MD5

                                                                          dddd32fd1d3cd3360813c93147b69026

                                                                          SHA1

                                                                          744005eb35ece18d5e10230dae71d7b8c0e35e7f

                                                                          SHA256

                                                                          ced950b650a85c46b97178c3687c7f5a203375c0956e043c399660b2a374722c

                                                                          SHA512

                                                                          32618cc1395f613d6e4fde76ce292e73dc32d3591a9136809c3608e459d04918040e9a2ed1b3b2217cc3ebf4251f14bffd6b9c7743996efddc954fafeff9e4b0

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\datareporting\glean\pending_pings\6a9479f3-ece6-4e51-a527-91e10cb611ef

                                                                          Filesize

                                                                          12KB

                                                                          MD5

                                                                          2b218ab187fa41739a1451ba072b1bd9

                                                                          SHA1

                                                                          3c5b4e9b709b294ff073c231e0788ff3284d93d2

                                                                          SHA256

                                                                          25f1c4a29b2d44d37c52eacf2400cefda72ed9797d94a0d7bc080025e43f6024

                                                                          SHA512

                                                                          712774fee63837a60cd88dc7051e0f2bfef4cb52d282191dd95bbe48a74794f48a019e329230ed45da6047ce75adf9e105838d48b1cfc64bc5f1619e6bf2bfcb

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\datareporting\glean\pending_pings\7e322c6c-463a-4079-9562-222045d5f929

                                                                          Filesize

                                                                          785B

                                                                          MD5

                                                                          7c4dec49da49cc1859d9e17fd4c601f3

                                                                          SHA1

                                                                          fe7cfcde6e7e5a19d6236dd175355b14a81126ae

                                                                          SHA256

                                                                          65a45dbf0a69ff3879ca8d1692293f23d0f7cdf87e27c3428004624c15631e46

                                                                          SHA512

                                                                          401e7983014885b74695edba936540d1fe95482e11764ad397a61a56e601d536b207670e3614883b3e42abe1c041c945ada6b1502ebff7298d7495b740004d17

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\datareporting\glean\pending_pings\e3a4b937-7ef6-4bab-85bd-ba21af68e6d2

                                                                          Filesize

                                                                          656B

                                                                          MD5

                                                                          4667063ba9fa7be6635c880d07d8c4c2

                                                                          SHA1

                                                                          e73d2c56abfc4e21accd6613b43bdfcbcbd1ba3a

                                                                          SHA256

                                                                          507ff6132c591b4d225908efb9f45f1074c6563fcfebebc77647b2194aa71c4c

                                                                          SHA512

                                                                          fe62ea15350aab5d26f701f1892b94eb9987e444fe23ce52532b9b04aae9cb066ef8d03e0bacbf5d05d391638394fa48321968f613926b8a2edd76fbf82455cb

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                          Filesize

                                                                          997KB

                                                                          MD5

                                                                          fe3355639648c417e8307c6d051e3e37

                                                                          SHA1

                                                                          f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                          SHA256

                                                                          1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                          SHA512

                                                                          8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                          Filesize

                                                                          116B

                                                                          MD5

                                                                          3d33cdc0b3d281e67dd52e14435dd04f

                                                                          SHA1

                                                                          4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                          SHA256

                                                                          f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                          SHA512

                                                                          a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                          Filesize

                                                                          479B

                                                                          MD5

                                                                          49ddb419d96dceb9069018535fb2e2fc

                                                                          SHA1

                                                                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                          SHA256

                                                                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                          SHA512

                                                                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                          Filesize

                                                                          372B

                                                                          MD5

                                                                          8be33af717bb1b67fbd61c3f4b807e9e

                                                                          SHA1

                                                                          7cf17656d174d951957ff36810e874a134dd49e0

                                                                          SHA256

                                                                          e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                          SHA512

                                                                          6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                          Filesize

                                                                          5.5MB

                                                                          MD5

                                                                          37addeaef98d1c4f137d08ae0a531eeb

                                                                          SHA1

                                                                          29337360ec3fdd04ae991d9000f6d542d6bb1931

                                                                          SHA256

                                                                          0271f9472d717cd94fa0a5e380d166f6984b200a20be12b3907bc29d93aa732c

                                                                          SHA512

                                                                          cb9951619f16add19046bff65de1fbc7a73bb731623215d26b15d1cfc60f6db93b4e3cfeca60023d11f4414fcc6889ab4e4a72854c4a628c09aa0b963dda4ce3

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          688bed3676d2104e7f17ae1cd2c59404

                                                                          SHA1

                                                                          952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                          SHA256

                                                                          33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                          SHA512

                                                                          7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          937326fead5fd401f6cca9118bd9ade9

                                                                          SHA1

                                                                          4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                          SHA256

                                                                          68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                          SHA512

                                                                          b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\prefs-1.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          5e0a6056afe6bb4d9b69042774330542

                                                                          SHA1

                                                                          1b1c74ec753523ad8792fc458eb39d7b1bf7f94d

                                                                          SHA256

                                                                          a317c2fa8c12218cc175f562a5d3e19fe09bd25d00cf2012630c316e5ded6c8f

                                                                          SHA512

                                                                          ee9f78cf04285d72a0079a0869bfa25ea82308db173bef36057da240a1cbc6f61ace72244652ba267357f84482ee38d7fe04574e87e06150148a956d80b78b74

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\prefs-1.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          7d2159372e9b07443a02c46ae9d98556

                                                                          SHA1

                                                                          fec2ccaf419537b45dba98c818151fb9144e1e32

                                                                          SHA256

                                                                          5c14e50449a2abfb63fd42bbff542e4a9bddfc1413e558332b4ba1d063f319ca

                                                                          SHA512

                                                                          3bc71373e69d02fdd3b80e9aea4078bd3148e7e7cac8a96a2476f6a70cea5965b83e0943d0e8e28c8ba95152250bf37d1620da8de42c30cd5081cd2aafb7fe35

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\prefs-1.js

                                                                          Filesize

                                                                          7KB

                                                                          MD5

                                                                          0763f1611016bc6d2f58e027217b7dab

                                                                          SHA1

                                                                          85e0955d93e32d4a9c5e3e95a25147bd2cf1eb5a

                                                                          SHA256

                                                                          b7b69fa18c50c974cb6a40a54138ec507131268f51f2d4cb96aef83151a91659

                                                                          SHA512

                                                                          d6f8d281fba9bf5845a95ebeb7cef5c473498b37e942828a59cd90e762cc73ada30360ac0fe64ad0c4af719c6f0b382fc18a71c124f14ab4e4bb6549bda5083f

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\prefs.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          90c7b3f46a69a15d30b15d4f5d242ed8

                                                                          SHA1

                                                                          d995a53e8ea0bdc82fb20840f692fb57177818d0

                                                                          SHA256

                                                                          dd8f29a605f082126a99b3fcf48cc06b1dc8a8b0bfd6201951aad98e0d2257de

                                                                          SHA512

                                                                          f3d49ff97ba8ca897beab6332ef6fcb31e88c9cfe285e13027e50291c389b3f7cd152d8a4cc1262f4266de5c9702eb7b09abfa5f973d6747d7792f51e978214e

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\prefs.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          ed81e49e8db90ab45a871da5da972196

                                                                          SHA1

                                                                          87f5dc5a33fdfcc6e6cebb3f53e51da1eb65341a

                                                                          SHA256

                                                                          1019558d496a9f8c9457c169a2afea90e5c9545ef55ea8d366456a3d81d7ed6e

                                                                          SHA512

                                                                          62dc4fff64120138bd2985ad2cae3a517a569d413db4aed2fe370254a2c0cb4731c944f5a4e0394c77cb1d2f727dd8e4c5c2eb3b98056caae3d72ae521d763de

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\sessionCheckpoints.json.tmp

                                                                          Filesize

                                                                          53B

                                                                          MD5

                                                                          ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                          SHA1

                                                                          b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                          SHA256

                                                                          792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                          SHA512

                                                                          076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\sessionCheckpoints.json.tmp

                                                                          Filesize

                                                                          90B

                                                                          MD5

                                                                          c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                          SHA1

                                                                          5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                          SHA256

                                                                          00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                          SHA512

                                                                          71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dt6wk0rq.default-release\sessionstore-backups\recovery.jsonlz4

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          a1bb66bdcb2d439b70b7c54867b12a75

                                                                          SHA1

                                                                          78417abc80233f454f9f764cdb55939149ac852f

                                                                          SHA256

                                                                          6cd56cc0678baabec6f4f2fb04033b1c5a6d2ecbe22c0fd3124b2174dd27574a

                                                                          SHA512

                                                                          d3a1c76ba0d8bd54e704bc544661b3e06238a402a35c8f101c824d770764ccf8d70a55fd9e0ba7834116d155e25a7182385ce3e1fc5588fc89f302c15a5f2d0d

                                                                        • C:\Users\Admin\AppData\Roaming\izhEFwHe7P.exe

                                                                          Filesize

                                                                          563KB

                                                                          MD5

                                                                          7909fbb384c65c469c877dda84add34c

                                                                          SHA1

                                                                          3280b2d39ccd8b669e95e971652ef6578136e377

                                                                          SHA256

                                                                          402b94a9f6fbbf5822c2f8c60f0dcb373cdeb9508b4730de6bdccbb6a52ba8ee

                                                                          SHA512

                                                                          a003ecaf93f5343275c8baa75d420266825a8cde7bf3ec8b3ae6ab2ff60c619a9d9dad20256c717ed8a5d925c8c16f31a63ac9c4edc01689a3584ce04810b788

                                                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          64dac8316063005732778edd56bb99ca

                                                                          SHA1

                                                                          5dfb87b3d5091dda07ddd2db73775e964e4c32bc

                                                                          SHA256

                                                                          b6d0423b14c29e89ccee3beb38809675495faa35ff9a9cc7873ece4f2ff2ff3a

                                                                          SHA512

                                                                          06aadd7ac3d2fae26673ddc098554a3553e98b5520e94987774df9442b9effa9281a3b6a4b5d7a89f31a7d65a5e21dbe5351beeff45b4e7b9d2066e8bd6e29f5

                                                                        • \ProgramData\mozglue.dll

                                                                          Filesize

                                                                          593KB

                                                                          MD5

                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                          SHA1

                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                          SHA256

                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                          SHA512

                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                        • \ProgramData\nss3.dll

                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                          SHA1

                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                          SHA256

                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                          SHA512

                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                        • \Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          324d93ead119e4313f6f81696eeaf7f9

                                                                          SHA1

                                                                          42af7724e7c738fbf387f2c6f5fb428c2e0686aa

                                                                          SHA256

                                                                          4341e8171f70008e0dc7c6309ea60371cc68e29ad7ee457914f5bf676fd30c3d

                                                                          SHA512

                                                                          96c8056c6756441ccd5326785792b93246e51ce1587c7314c5b16679345d04a4470e3103b40ccc6a04b8478dce2b2ad15c9f2ab1307fc593556ee0a4af66fde2

                                                                        • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                          Filesize

                                                                          2.9MB

                                                                          MD5

                                                                          b826dd92d78ea2526e465a34324ebeea

                                                                          SHA1

                                                                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                          SHA256

                                                                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                          SHA512

                                                                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                        • \Users\Admin\AppData\Roaming\d3d9.dll

                                                                          Filesize

                                                                          534KB

                                                                          MD5

                                                                          a6da8d868dbd5c9fe6b505db0ee7eb71

                                                                          SHA1

                                                                          3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                                          SHA256

                                                                          4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                                          SHA512

                                                                          132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                                        • memory/964-147-0x00000000011F0000-0x0000000001282000-memory.dmp

                                                                          Filesize

                                                                          584KB

                                                                        • memory/968-550-0x0000000000050000-0x00000000000A2000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1152-3480-0x0000000000920000-0x000000000096C000-memory.dmp

                                                                          Filesize

                                                                          304KB

                                                                        • memory/1152-578-0x00000000002E0000-0x0000000000394000-memory.dmp

                                                                          Filesize

                                                                          720KB

                                                                        • memory/1152-612-0x000000001BDE0000-0x000000001BEC2000-memory.dmp

                                                                          Filesize

                                                                          904KB

                                                                        • memory/1152-3479-0x00000000004A0000-0x0000000000512000-memory.dmp

                                                                          Filesize

                                                                          456KB

                                                                        • memory/1464-173-0x0000000000B10000-0x0000000000D53000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/1464-487-0x0000000000B10000-0x0000000000D53000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/1464-195-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                          Filesize

                                                                          972KB

                                                                        • memory/1568-413-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1568-402-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1836-67-0x0000000000280000-0x0000000000396000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/1932-44-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1932-40-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1932-52-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1932-46-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1932-48-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/1932-49-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1932-51-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1932-42-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/1972-412-0x00000000005E0000-0x00000000005FA000-memory.dmp

                                                                          Filesize

                                                                          104KB

                                                                        • memory/1972-248-0x00000000010D0000-0x0000000001148000-memory.dmp

                                                                          Filesize

                                                                          480KB

                                                                        • memory/2004-132-0x0000000000870000-0x00000000008C2000-memory.dmp

                                                                          Filesize

                                                                          328KB

                                                                        • memory/2184-350-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                          Filesize

                                                                          4.1MB

                                                                        • memory/2264-18-0x00000000064E0000-0x0000000006992000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2264-15-0x0000000001230000-0x00000000016E2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2264-3-0x0000000001230000-0x00000000016E2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2264-2-0x0000000001231000-0x000000000125F000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/2264-16-0x0000000001230000-0x00000000016E2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2264-5-0x0000000001230000-0x00000000016E2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2264-1-0x0000000077310000-0x0000000077312000-memory.dmp

                                                                          Filesize

                                                                          8KB

                                                                        • memory/2264-0-0x0000000001230000-0x00000000016E2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/2368-233-0x0000000000B70000-0x0000000000BF0000-memory.dmp

                                                                          Filesize

                                                                          512KB

                                                                        • memory/2396-395-0x0000000000D10000-0x0000000000D64000-memory.dmp

                                                                          Filesize

                                                                          336KB

                                                                        • memory/2408-458-0x0000000000A70000-0x0000000001113000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2408-496-0x0000000000A70000-0x0000000001113000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2564-525-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-352-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-342-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-351-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-348-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-346-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-344-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2564-340-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/2588-599-0x00000000009C0000-0x0000000000E9E000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2588-600-0x0000000006730000-0x0000000006C0E000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2588-589-0x00000000009C0000-0x0000000000E9E000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2592-50-0x00000000020D0000-0x00000000040D0000-memory.dmp

                                                                          Filesize

                                                                          32.0MB

                                                                        • memory/2592-37-0x0000000000960000-0x00000000009B4000-memory.dmp

                                                                          Filesize

                                                                          336KB

                                                                        • memory/2708-3484-0x0000000005B50000-0x0000000005DF2000-memory.dmp

                                                                          Filesize

                                                                          2.6MB

                                                                        • memory/2708-3485-0x0000000005DF0000-0x0000000006086000-memory.dmp

                                                                          Filesize

                                                                          2.6MB

                                                                        • memory/2708-3486-0x00000000003C0000-0x00000000003E2000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/2708-520-0x0000000000DA0000-0x00000000017E6000-memory.dmp

                                                                          Filesize

                                                                          10.3MB

                                                                        • memory/2944-3575-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-3512-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-3511-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-3555-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-3554-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-3553-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-3556-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/2944-601-0x0000000000AC0000-0x0000000000F9E000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2944-3478-0x0000000000AC0000-0x0000000000F9E000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/2944-3579-0x00000000061C0000-0x0000000006863000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/3036-178-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-588-0x0000000006220000-0x00000000066FE000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/3036-333-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-218-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-451-0x0000000006220000-0x00000000068C3000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/3036-450-0x0000000006220000-0x00000000068C3000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/3036-177-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-500-0x0000000006220000-0x00000000068C3000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/3036-17-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-68-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-3568-0x0000000006220000-0x0000000006463000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/3036-19-0x00000000003F1000-0x000000000041F000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/3036-20-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-22-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3036-172-0x0000000006220000-0x0000000006463000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/3036-171-0x0000000006220000-0x0000000006463000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/3036-611-0x0000000006220000-0x00000000066FE000-memory.dmp

                                                                          Filesize

                                                                          4.9MB

                                                                        • memory/3036-3570-0x0000000006220000-0x0000000006463000-memory.dmp

                                                                          Filesize

                                                                          2.3MB

                                                                        • memory/3036-169-0x00000000003F0000-0x00000000008A2000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3040-292-0x00000000003F0000-0x000000000049E000-memory.dmp

                                                                          Filesize

                                                                          696KB

                                                                        • memory/3044-110-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-99-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-101-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-95-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-93-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-129-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-97-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-107-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-106-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-103-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/3044-111-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/9500-3546-0x0000000000CA0000-0x0000000001343000-memory.dmp

                                                                          Filesize

                                                                          6.6MB

                                                                        • memory/9500-3513-0x0000000000CA0000-0x0000000001343000-memory.dmp

                                                                          Filesize

                                                                          6.6MB