Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2024 13:32

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    604496f01be7b778d8a564c57677d644

  • SHA1

    b3a7781e8a94cadb2450c4a3df11b4a2e94ef82c

  • SHA256

    ad1e3f88d7d1c29836570f13b8b540dfdaca9434b9f47170b00cf54519c5edcc

  • SHA512

    62b720afcefbf8ba96698d428859466dccd83e03440e06c2264557185ce415b18240dfaed46065cf2775d8f890f112ae2e5d88910b19166fa001c67e671426fc

  • SSDEEP

    49152:UFUzI1/+kp2sID/l8KmuQQHur5j2IZxEmtyeeu:b8V+kksIp8X7QEKWeu

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

cryptbot

C2

sevtvf17pt.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Detects ZharkBot payload 2 IoCs

    ZharkBot is a botnet written C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 36 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:744
          • C:\Users\Admin\AppData\Local\Temp\1000002001\e34c91c0d5.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\e34c91c0d5.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1208
          • C:\Users\Admin\1000015002\7025e32886.exe
            "C:\Users\Admin\1000015002\7025e32886.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4308
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\1000018042\blo.ps1"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3752
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4524
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                6⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4264
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1fbed95d-af0f-4d3a-9d89-c5cb961c6525} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" gpu
                  7⤵
                    PID:1340
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4dbb016b-0253-4876-832e-a4293ff84de2} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" socket
                    7⤵
                    • Checks processor information in registry
                    PID:2752
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4vnbccwa\4vnbccwa.cmdline"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:3504
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA77B.tmp" "c:\Users\Admin\AppData\Local\Temp\4vnbccwa\CSC84D2464B2E75494C915F9E4CDF343A13.TMP"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2016
            • C:\Users\Admin\AppData\Local\Temp\1000019101\c71420f51c.exe
              "C:\Users\Admin\AppData\Local\Temp\1000019101\c71420f51c.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1904
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                5⤵
                  PID:2304
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                    6⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:3148
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbd1c9cd-f177-469a-a1f5-28a32a4a72fb} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" gpu
                      7⤵
                        PID:1412
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b40636ff-fb4d-4cf5-aa4c-2f96f2508d09} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" socket
                        7⤵
                          PID:5004
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2940 -childID 1 -isForBrowser -prefsHandle 2696 -prefMapHandle 3132 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a58295fa-bf0f-4ee3-bf92-4d48217f10be} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                          7⤵
                            PID:5096
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3808 -childID 2 -isForBrowser -prefsHandle 3800 -prefMapHandle 3796 -prefsLen 22693 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f36e676e-5c29-4ce6-af01-cd92fdf5af67} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                            7⤵
                              PID:1048
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4332 -childID 3 -isForBrowser -prefsHandle 4324 -prefMapHandle 3820 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c83f57d-e0a7-4e41-a4ad-1f8d747cdcc9} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                              7⤵
                                PID:2872
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5088 -prefMapHandle 5084 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a652e19d-aff2-404e-ad28-0c66e63a5d9e} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" utility
                                7⤵
                                • Checks processor information in registry
                                PID:3572
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5344 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {489042a6-7924-450d-a05b-20ceec055e61} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                                7⤵
                                  PID:4532
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5704 -childID 5 -isForBrowser -prefsHandle 5624 -prefMapHandle 5632 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {902ba4e2-ed60-4057-9119-6ac49402b982} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                                  7⤵
                                    PID:1160
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5812 -childID 6 -isForBrowser -prefsHandle 5892 -prefMapHandle 5888 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {451eeb53-2412-4436-bb55-e27bc9842d65} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab
                                    7⤵
                                      PID:5072
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                  5⤵
                                    PID:2464
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                      6⤵
                                      • Checks processor information in registry
                                      PID:3368
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                    5⤵
                                      PID:5812
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                        6⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1476
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 24648 -prefMapSize 244898 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d78fa540-7dac-464b-8b00-386e1b49a7e2} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" gpu
                                          7⤵
                                            PID:6008
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2440 -prefsLen 25568 -prefMapSize 244898 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12bfd9c8-beef-4ef8-be56-7d7fc58ed15c} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" socket
                                            7⤵
                                              PID:5188
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2988 -childID 1 -isForBrowser -prefsHandle 3128 -prefMapHandle 3144 -prefsLen 23142 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a1c4eaf-5fe6-4d2a-88aa-c18dd480e57b} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab
                                              7⤵
                                                PID:5648
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4024 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3972 -prefsLen 30001 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f961564-b713-4c38-a4c8-96543048a7fe} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab
                                                7⤵
                                                  PID:3616
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4696 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4608 -prefMapHandle 4664 -prefsLen 30001 -prefMapSize 244898 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ea4a31a-a1e7-4e88-ac4a-df80303064fd} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" utility
                                                  7⤵
                                                  • Checks processor information in registry
                                                  PID:2980
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4960 -childID 3 -isForBrowser -prefsHandle 5004 -prefMapHandle 5000 -prefsLen 27434 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0741c5f8-2749-4d8f-b3bd-e40e3e44a0a2} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab
                                                  7⤵
                                                    PID:3224
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 4 -isForBrowser -prefsHandle 5136 -prefMapHandle 5140 -prefsLen 27434 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06efabe1-b24d-4409-beb2-417f7e47586b} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab
                                                    7⤵
                                                      PID:4376
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 5 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27434 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5a9278e-8bdd-424b-b3b8-8ea5a85cbb45} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab
                                                      7⤵
                                                        PID:5020
                                                • C:\Users\Admin\AppData\Local\Temp\1000020001\5878b15517.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1000020001\5878b15517.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4340
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                    5⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Adds Run key to start application
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1912
                                                    • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3484
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies system certificate store
                                                        PID:884
                                                    • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
                                                      6⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5144
                                                      • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                                                        7⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4688
                                                        • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5616
                                                    • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5424
                                                    • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5808
                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                        C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Checks processor information in registry
                                                        PID:4980
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 1228
                                                          8⤵
                                                          • Program crash
                                                          PID:1472
                                                    • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4056
                                                    • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3896
                                                    • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6056
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                        7⤵
                                                          PID:3060
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 412
                                                            8⤵
                                                            • Program crash
                                                            PID:1156
                                                      • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"
                                                        6⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5548
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5700
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            8⤵
                                                            • Enumerates processes with tasklist
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1712
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /I "wrsa opssvc"
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1952
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            8⤵
                                                            • Enumerates processes with tasklist
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5672
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5680
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c md 607698
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2892
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /V "MaskBathroomCompositionInjection" Participants
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5852
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5896
                                                          • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                                                            Waters.pif Q
                                                            8⤵
                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5752
                                                            • C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe"
                                                              9⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4956
                                                          • C:\Windows\SysWOW64\choice.exe
                                                            choice /d y /t 5
                                                            8⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4472
                                                      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1872
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3748
                                                      • C:\Users\Admin\AppData\Local\Temp\1000308001\1a5d815cdf.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1000308001\1a5d815cdf.exe"
                                                        6⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5640
                                                      • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6024
                                                      • C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5540
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2556
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2128
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                                2⤵
                                                • Drops startup file
                                                • System Location Discovery: System Language Discovery
                                                PID:5276
                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                              C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5564
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5560
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3060 -ip 3060
                                              1⤵
                                                PID:5168
                                              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:2964
                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:624
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5964
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4980 -ip 4980
                                                1⤵
                                                  PID:1556

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\HCFBFBAEBKJKEBGCAEHC

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  4354b2460c135f1687829aa804aeb511

                                                  SHA1

                                                  83fa0c91a0de816c0d0705d393fc11898314d6a6

                                                  SHA256

                                                  080def497cd45198908b6ecba6e013087015c04d63e558e6761f82a2b3459845

                                                  SHA512

                                                  5a96e3e35879c8fd0f266e755440b560c8780f1ccbcc7b0f86b1d7a554b4c5d98a453d851f3264e85f60d7116583c8939fa4e344270ef49cf5a8f36cdae1eb17

                                                • C:\ProgramData\mozglue.dll

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                  SHA1

                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                  SHA256

                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                  SHA512

                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                • C:\ProgramData\nss3.dll

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                  SHA1

                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                  SHA256

                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                  SHA512

                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                • C:\Users\Admin\1000018042\blo.ps1

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  90019cfd00d043c3f6da5719cd344c62

                                                  SHA1

                                                  034bd2d68f4ec66b227ab7d31d2135e28d75b131

                                                  SHA256

                                                  1401c46006791e4d0fea52e9e98991df542eb0a24c50da4856f4ac1eda5cd4ec

                                                  SHA512

                                                  7e00c5eade73a95225f71574b48d66e19241943f47732ed4d352440e6fcfc7c44b8cc4bdfeaa51b04f7bb16b3a4cc2005e1a4b71c578c4dd0399fabbe997b1f2

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\activity-stream.discovery_stream.json

                                                  Filesize

                                                  21KB

                                                  MD5

                                                  11f9549c0e43d522d57d1982b0a0e800

                                                  SHA1

                                                  8dd6bfa4cfe52c2b80df7cc27200097756f41e17

                                                  SHA256

                                                  a9ea289be899f4953f08d7cf1ac9aaad00b3c2b604d5882e4179801f2773fd6e

                                                  SHA512

                                                  cba407e39a5ae8a0ef1d2ee8e0f71aee1a76437ae6622dd0330ab8f53286a69f1d6f1b5cf48616f21e5412cacdc799190ed1894151346afe04bf02bcdc30f8f0

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\startupCache\startupCache.8.little

                                                  Filesize

                                                  76KB

                                                  MD5

                                                  957bfc0ff2a854461d455a734336d985

                                                  SHA1

                                                  6f92150422c8ccf770e057252da17abb1ddacd1b

                                                  SHA256

                                                  7611725078a73b5dcceca074e69641086ce5e52cad01d2b3153c29635024c735

                                                  SHA512

                                                  7dd74ccecf99d37126529d936578a89df44ac71862313a1d51bff9c498ac77d85479ea17cf512b061fc040aae85cb3ac13f941d432f069f5f98bd64d825f930e

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\startupCache\webext.sc.lz4

                                                  Filesize

                                                  107KB

                                                  MD5

                                                  cc4b28fdc91c598857b67e2353e5e5b4

                                                  SHA1

                                                  f4024ae75f756e29b30cd781c56c1a8187d3c9bd

                                                  SHA256

                                                  d01d8f5566518b99a8ec7e4841c4f45414f380e929dbe80c93f93b23e07d3184

                                                  SHA512

                                                  c94d6585a6c133cf1a4a2de496d85bf32b48a952e2fc24879a151552bc72c7261a76f15b7aab6be6bafc62c59300532faa28fbf32ed0d9e86bf4225a602f9168

                                                • C:\Users\Admin\AppData\Local\Temp\1000002001\e34c91c0d5.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  d512cd419c532fc7d6c3a5c6c4a303a3

                                                  SHA1

                                                  3ea05f000ad46070d41e449b3f1b7419144d98ff

                                                  SHA256

                                                  d1dc3eca3c7794fee2ef250e63d99101aaae555751ab83eefa9f8952a7f2c7d9

                                                  SHA512

                                                  c92c15990c12770d75310b8ee32181ce165348c898cb8665afd28be7e4224f0876ba7aab2667246e393c90ad3facab79fd03b4876d5b086d436d52188954c448

                                                • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                  Filesize

                                                  312KB

                                                  MD5

                                                  389881b424cf4d7ec66de13f01c7232a

                                                  SHA1

                                                  d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                                  SHA256

                                                  9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                                  SHA512

                                                  2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                                • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                  Filesize

                                                  416KB

                                                  MD5

                                                  f5d7b79ee6b6da6b50e536030bcc3b59

                                                  SHA1

                                                  751b555a8eede96d55395290f60adc43b28ba5e2

                                                  SHA256

                                                  2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                  SHA512

                                                  532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                • C:\Users\Admin\AppData\Local\Temp\1000019101\c71420f51c.exe

                                                  Filesize

                                                  900KB

                                                  MD5

                                                  5d8d57a3729cfbbaba4e3e60d6bef3d8

                                                  SHA1

                                                  5c1c7352807360845a264980c17fa5dccf4a0498

                                                  SHA256

                                                  a11d5ba1eb5d8d3d5b6e29caf6c4fa6c3a74a28b66fcf29ab46891d2ff9747b3

                                                  SHA512

                                                  7145ae65934de9d06b0a6813c4e542ed97cb7789beb28e34d492a732204bc312d2a0382e185875b8749911edde0dcbf22d83560f45e7399533ed3fe47425a8da

                                                • C:\Users\Admin\AppData\Local\Temp\1000020001\5878b15517.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  6a6234ce6830b57e0f1fa2e728e7e8d1

                                                  SHA1

                                                  92d0e6aeba51aeb9d79196d06be442768f1a78c9

                                                  SHA256

                                                  edc95e00991bbd33ceb4cb2cfd88aa714011ed69296ec62cc40c0be6c83450f3

                                                  SHA512

                                                  926eca735e4b3eac6cd6f178ce98721d50fc4f3aa8fd9bf49332c9d58b14ceb12ffb0bb029fb1162f771b8ad76d6c35f58b2ab4f99b77d5c81a29a55a2e7c50f

                                                • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe

                                                  Filesize

                                                  6.3MB

                                                  MD5

                                                  2426fa19f0c2cc5de92d6ef43337c2d1

                                                  SHA1

                                                  97b742a006365ad06a8d0933da8d72c51cca8e63

                                                  SHA256

                                                  4d10776348522e720fd36f175f9f735039e4aa3ae9543886320cd75e45e77754

                                                  SHA512

                                                  e6dfea55d923c4fa9a6e2e1d9dfa63ec1a5a4b34ce652dbed7b1442f92e628a18d7734128c735757665e07ceb4ca1fff891bea816925177462181242c6075690

                                                • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                  Filesize

                                                  187KB

                                                  MD5

                                                  7a02aa17200aeac25a375f290a4b4c95

                                                  SHA1

                                                  7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                  SHA256

                                                  836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                  SHA512

                                                  f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                  Filesize

                                                  4.1MB

                                                  MD5

                                                  7fa5c660d124162c405984d14042506f

                                                  SHA1

                                                  69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                  SHA256

                                                  fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                  SHA512

                                                  d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                  Filesize

                                                  494KB

                                                  MD5

                                                  6760374f17416485fa941b354d3dd800

                                                  SHA1

                                                  d88389ec19ac3e87bc743ba3f8b7c518601fdbf9

                                                  SHA256

                                                  9dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5

                                                  SHA512

                                                  6e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab

                                                • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe

                                                  Filesize

                                                  454KB

                                                  MD5

                                                  37d198ad751d31a71acc9cb28ed0c64e

                                                  SHA1

                                                  8eb519b7a6df66d84c566605da9a0946717a921d

                                                  SHA256

                                                  1ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde

                                                  SHA512

                                                  60923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96

                                                • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe

                                                  Filesize

                                                  673KB

                                                  MD5

                                                  b859d1252109669c1a82b235aaf40932

                                                  SHA1

                                                  b16ea90025a7d0fad9196aa09d1091244af37474

                                                  SHA256

                                                  083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                  SHA512

                                                  9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  2b01c9b0c69f13da5ee7889a4b17c45e

                                                  SHA1

                                                  27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                  SHA256

                                                  d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                  SHA512

                                                  23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                  Filesize

                                                  314KB

                                                  MD5

                                                  ff5afed0a8b802d74af1c1422c720446

                                                  SHA1

                                                  7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                  SHA256

                                                  17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                  SHA512

                                                  11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                                  Filesize

                                                  352KB

                                                  MD5

                                                  2f1d09f64218fffe7243a8b44345b27e

                                                  SHA1

                                                  72553e1b3a759c17f54e7b568f39b3f8f1b1cdbe

                                                  SHA256

                                                  4a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2

                                                  SHA512

                                                  5871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909

                                                • C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe

                                                  Filesize

                                                  10.3MB

                                                  MD5

                                                  489f9c4fc0afa8d1be37bc5e2f57833b

                                                  SHA1

                                                  c2bac602a73c19b345b64e0b7cf2f837be307b61

                                                  SHA256

                                                  d9dbfbc8294cbf6a32d43413ed328594ee058d7356c26eb5cd196f9f4867c078

                                                  SHA512

                                                  7f43d972f58a025d09143c57351221fe7b10c1756a0c5578ac42698c21ea05986d4bbc0c7ff4be339c2d0930b505e4f4dda53c0800d84b059a21be938adb678e

                                                • C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe

                                                  Filesize

                                                  10.5MB

                                                  MD5

                                                  38ef48a2e156067f1770497335e92066

                                                  SHA1

                                                  304bcccdfb486bf797d69f109f0b6fe64a94d945

                                                  SHA256

                                                  88efb8b6990e916e7590c2bd3f734f390f7c3d7b517a5fdc1baba0a2f6fbd54c

                                                  SHA512

                                                  7212757dc8bd59ce9e5d7e474b78324fae11b7a20dc1326fe34d2bdeff4a6b4e9e4471326656cc3db162feaec65ef0f0c96efb91f3ce9b3173f725195d4b7145

                                                • C:\Users\Admin\AppData\Local\Temp\453224882060

                                                  Filesize

                                                  38KB

                                                  MD5

                                                  9c20eb1a6841517cf1ff2e748dcd022e

                                                  SHA1

                                                  f22be7eca7f904a8fbf7fec531cd9a05f77c6b84

                                                  SHA256

                                                  cc17538dc330b6db078de99d50520da9807090fda729936c3268b00c6e8bcee1

                                                  SHA512

                                                  021d48483d77c7d6c147ef928fe65c041940f9a015dcdf36bc279ffa1667c0a3df498b05602feeba288dfd58ff21ed9ec8f0517f0c118923ae3109701ee65592

                                                • C:\Users\Admin\AppData\Local\Temp\4vnbccwa\4vnbccwa.dll

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  eda96a316f7a1e0d4127049793f804c0

                                                  SHA1

                                                  dc081b13e61b8ba353c2c58f4f7da371c09e090a

                                                  SHA256

                                                  421b049b4e98080e1e199155590e2eb48738434295b041f4ef5dbcc84b163a19

                                                  SHA512

                                                  1bef1b82f715c544bdd07e8e47ede3838e12f3a7323cede9137af836fec1db46d490eac92ff9de5cdf874c2fec1606ddd8ddeab20adff7fa0fb93f92f72d1a6d

                                                • C:\Users\Admin\AppData\Local\Temp\Emotions

                                                  Filesize

                                                  19KB

                                                  MD5

                                                  b98d78c3abe777a5474a60e970a674ad

                                                  SHA1

                                                  079e438485e46aff758e2dff4356fdd2c7575d78

                                                  SHA256

                                                  2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

                                                  SHA512

                                                  6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

                                                • C:\Users\Admin\AppData\Local\Temp\Participants

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  f0e725addf4ec15a56aa0bde5bd8b2a7

                                                  SHA1

                                                  1f54a49195d3f7fd93c5fec06cc5904c57995147

                                                  SHA256

                                                  7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

                                                  SHA512

                                                  00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

                                                • C:\Users\Admin\AppData\Local\Temp\RESA77B.tmp

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  8fdc2272fa752f421575b787392deb1a

                                                  SHA1

                                                  5a9c12de469bb469dd4c3aa7fd55cefc8d136b66

                                                  SHA256

                                                  c2893545d2b9cb5965d5a831dccb7b00c92dcad99b70dc92e685cd8d530219a5

                                                  SHA512

                                                  389a05fb6ae54abb58ef433c61ef3a22302b04981d6f7e78057d29db39c6e195b7281a97bafb0d65eb804938f84dc8228312117b0e39937f2d47d59931d64992

                                                • C:\Users\Admin\AppData\Local\Temp\TmpBBDE.tmp

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  1420d30f964eac2c85b2ccfe968eebce

                                                  SHA1

                                                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                  SHA256

                                                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                  SHA512

                                                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wt2a5f4s.15x.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  604496f01be7b778d8a564c57677d644

                                                  SHA1

                                                  b3a7781e8a94cadb2450c4a3df11b4a2e94ef82c

                                                  SHA256

                                                  ad1e3f88d7d1c29836570f13b8b540dfdaca9434b9f47170b00cf54519c5edcc

                                                  SHA512

                                                  62b720afcefbf8ba96698d428859466dccd83e03440e06c2264557185ce415b18240dfaed46065cf2775d8f890f112ae2e5d88910b19166fa001c67e671426fc

                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                  Filesize

                                                  2.9MB

                                                  MD5

                                                  b826dd92d78ea2526e465a34324ebeea

                                                  SHA1

                                                  bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                  SHA256

                                                  7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                  SHA512

                                                  1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-945322488-2060912225-3527527000-1000\76b53b3ec448f7ccdda2063b15d2bfc3_03d68389-5a68-4d9e-92ac-47b927e624dd

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  5a2d16dd1e02ccff3c4d2a01a19a056c

                                                  SHA1

                                                  cfa86c2a91e4c8774533844ecb4343d6322f758d

                                                  SHA256

                                                  679fb949612dca3ed5d2174badaab65abdf9fcec34c351cb209802ef676cb76a

                                                  SHA512

                                                  01209954c3c36ce741770629f071c22c56b193ccff7c062873e58ead49e37efa23a8ac17c6392a893a9722ba0424446ccd10ccee9f781ca3298c683de17af1de

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\AlternateServices.bin

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  7df5fc8283fbc7ddc4ed6997603f8279

                                                  SHA1

                                                  1d43c7877f73aecd51079f15a471ddc0e90d93e9

                                                  SHA256

                                                  76d68cf8f089a6a09c40ab9b953d8e803a225b0b8a47f89ca0233edd358ecdc6

                                                  SHA512

                                                  9a0d35df656e4fb5a2167cfac0bc0215e92bb5fb243161ebeb3a839a80a9d9f1748485ac6ad7fdfea8b9be876f6267a31d74992d55b998f8b86329e5cf3c02ba

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\broadcast-listeners.json

                                                  Filesize

                                                  209B

                                                  MD5

                                                  97c3738563a9448365a735f5f29ed3d5

                                                  SHA1

                                                  15a81433236ca6e6ecc4e1c8d0fdb8523b265c57

                                                  SHA256

                                                  63221253f5c30efa214c2cd2adcf51a9c9f9a2c05f119b00a51c9579825c2c24

                                                  SHA512

                                                  ed98f42d5d02ab53a9e50f80b312bed4b5d05d053bec582cf9d619ef91251e86cf4f4d1123c645500fc1dc4673b49a8b7badd3f3a39f565ac643ca4fd0157ae6

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  23KB

                                                  MD5

                                                  59c1c247dc0168525de24b85ca369df1

                                                  SHA1

                                                  ae7366f87a74642e74ab3ee16c17a033fde35050

                                                  SHA256

                                                  fd698e9632b17247674094f94caf9a7961c47aede59d897b631f3ffec566d39d

                                                  SHA512

                                                  d5b6305b7eb3d3c924f289c175328e313d66b15a9fa8d1dbdaa4abcd9558ce3ce8b6fb1802338b2d3a8e790368fb466a69d70b478bdae8816b4f07db5bfa229e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  574bf0cd25488ce3d77affa117eea287

                                                  SHA1

                                                  affe94d2561a1337405f11abc5f90083bb00d370

                                                  SHA256

                                                  98745b860bd21f1ecaefd015c775e53ae32df8dada52f17fceedb33e9bd5adde

                                                  SHA512

                                                  d03f45d6f1f8c7b0711859df937860738cbda53fd86028a5eed7b1a89618305ddea200541d0a8c04d1ad6abaf41a850ae2e44117b4870f72c42fee0669113519

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  23KB

                                                  MD5

                                                  1a6e9b54b4c0949debfe0738a1042ea2

                                                  SHA1

                                                  a6554181794fcc41b1000d4b4174e09b1823591f

                                                  SHA256

                                                  9fa36f914330d8edcd4d9e132791d57e8235932e889213e9cf495a4d6476dd8d

                                                  SHA512

                                                  688e5fd5506c395b4705d43954d2a5f5d7a660a06590784488090d89197808aa04d53ae03bf745cdd2412c826e48b85f110a0fefbfc5c3f167add3c4c86e1eeb

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  64f1a95dcf4b27c448822e34ea9757e5

                                                  SHA1

                                                  744fbfe643b94febcdc12778430802f61da1274e

                                                  SHA256

                                                  1b662ba534aff576cd7f4d1ee8130f57f75050f3c83d24cd2891ac1ebfd093c0

                                                  SHA512

                                                  b9d430d91c4b05839e0155573ea440b87c61a513ebd120509491ea35a8c564ed0aa6201c3e56d4b745b5a9c7db30f175e040d5aa7d8ec72cddb5b9b4cf9bfa35

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  16cb7a515838f23fa05993de4066be67

                                                  SHA1

                                                  3444500ce3f291d66f2f8d95f1ddac1829b90bd5

                                                  SHA256

                                                  b2e558da2056bcd5119541126d6edb5657b6bf06d09fad7eb2c6af1ac8fded1b

                                                  SHA512

                                                  7000f2670dc82d96f26a859accc9baeee01e60a5c660a5d9915c29f7f140651753fd9bf59a58d4dc38497c4aff9dc53ecc0df04e6ca8f1519fd524c766ecb664

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  23KB

                                                  MD5

                                                  bbcf148c90ac55aad80fab7083594f72

                                                  SHA1

                                                  7173803aed9fd4528578e361ba73ad200f1e16b0

                                                  SHA256

                                                  5ad58d111d2f0665717bad1e14bb7fc61a7572fe022803d3ddf7f1080761b7b9

                                                  SHA512

                                                  fae813193cb9b54f88ff29ccd52eabe8840f706f6550e115f3214ffad799d4397827ac1edd2ea387b78886d6def8c2136ef824ae33fe1fc8fb677a58b54c486a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  24KB

                                                  MD5

                                                  38a0d22dd896782ece129ba0808701ea

                                                  SHA1

                                                  13e858f8a3abd6f1e3d04950cce8800320ccce57

                                                  SHA256

                                                  93685ba0e224fde47e7ecd69247ba0b0db2316fbd43d118e6ee7ec19d25e8a64

                                                  SHA512

                                                  3e74b9a0e83a9563ead8bcf66907c4e9d2cdbbf260ff9c034ac45836a6371e0ce039ff1c55471b9c24b8ae4a2b8bdf8d950198359029cfb73bc7594fd1a99de7

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  98fab438160a3894e2e53c104c6b3c33

                                                  SHA1

                                                  96433d3a3c435daed4fb0099831ead5552bc081f

                                                  SHA256

                                                  ae535ed34b8e762bbe02ac2d9f5348d24ddae8747f5ae924b9cbc239e5deb3b2

                                                  SHA512

                                                  aba48eb20b5be4cb351a6e5dbee6c110b1d2ab5efe71ff1006adc8f3ccd8fca71e34b40df9ace786281b6d4652db1c025f2d43de33745178d8fbad64df56e3dd

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  8648cfc6dc8fd373388caa6c00aed0eb

                                                  SHA1

                                                  74d05badf6834c24c7e14b4b0621521659fc8bee

                                                  SHA256

                                                  423da4c1f9655a77fbb54b11b602bce1b9a4ec9941c238e396a8030d52b775ee

                                                  SHA512

                                                  adaeac725c73a991516aa00f6f8b874207e072b399c0782d33a6c155ec6596abadcd7114dc880195c8c46b4b8584e09b5a9cf0a11dc15f5365ff21779b91c5c8

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\57ced4d6-ecb6-436f-b44b-62dab9ef1cc6

                                                  Filesize

                                                  982B

                                                  MD5

                                                  969259c6c76f9a8012f695972e75f9c3

                                                  SHA1

                                                  9dc7ace9205695e9326df8743035962367b13ce0

                                                  SHA256

                                                  57af06ec9f51ba81fdb0997e7e6088806840c77ebd7552b022d834ab16d04fa1

                                                  SHA512

                                                  4207970348d335cbd184f5b14e344cc9b155966abea2b5b1f3da57797730932cb3380fe4cc22c37a36484b8b4b46b7783953cd13a4d75e00c4da0f9a72354064

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\680df29d-76c1-424b-9ec8-a46be561a487

                                                  Filesize

                                                  671B

                                                  MD5

                                                  06bece9d04cb6c2c6b54198646ebaf0a

                                                  SHA1

                                                  85f4185f414a66fbd00d18e219594e96a80b7980

                                                  SHA256

                                                  a7e4f2d7b7f578902d8407b07a20c5fa89be4cba25e828559341d6b467c10bed

                                                  SHA512

                                                  dc6c3e25e448303870e5f5679a1746e3bba96731970ed2afb2dd275ed4d2778e37bd81a1c3d934502321e118579f9eb1df1be140b2af569c72233734a973d219

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\6f9dd291-5c34-4202-bf43-472e6a0fedd2

                                                  Filesize

                                                  982B

                                                  MD5

                                                  5d42fad1fb64471b7b53be1a876c2a26

                                                  SHA1

                                                  66479051d07c993391e721fc1276b0e47297ba77

                                                  SHA256

                                                  af86259957972bba9da85c2ee2038ec7731014ff40741f7fc6c4d3ad653a7f2c

                                                  SHA512

                                                  07b2a8e859b44953e9be9aa0b7ed380d07049069bffd71608fc2fc67a5f47b8f9fb385f5f029fa2437af09fbb28bc3a274b3a393f6d9ed5aa692dc6fd49ea000

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\795d1b25-0be6-4fc5-a14b-223df5c019ca

                                                  Filesize

                                                  573B

                                                  MD5

                                                  41e0eda5b8c0511be2e603bfac8cf8cd

                                                  SHA1

                                                  c4948f63c0fec0779b7bb5c9ecc5be460bfa5139

                                                  SHA256

                                                  d650e0ef4678af531860fe4833cd8d8f135fe1cd9fdc29c8157bbd327767f67c

                                                  SHA512

                                                  d602709472e2c8b984166f9f083eef520287aefc3aef051f472422d272806a2e5f57b31d6eebe6147a1bc8d25afbd85a7c9aedc9ad1acccffb028a628a0bf11e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\8a898add-b209-44cc-84b9-ce2b5ef4cd81

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  83d9c88b59bdb47fadf1a401a14159f2

                                                  SHA1

                                                  dde811cdae5b7a50e38d99c2703810fb59f9fa45

                                                  SHA256

                                                  307540a8d23fcd2805b517de0e953144794a9b3d437266a997ce9795d7c2f741

                                                  SHA512

                                                  2f2bd38b401132cf48676c9f3f35555faa6a39f19926ced88665ab8b967663a371964fc4125202f433e3f22d1415e68d9be460f9aaa653a00f0c3131e7a8c205

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\9b4976c1-5f39-4293-8632-d79aff3ab63a

                                                  Filesize

                                                  743B

                                                  MD5

                                                  62ac60f4991293e13b276ad472d2dce9

                                                  SHA1

                                                  4dcf8a9cbe20bfab92c20bb4abbdee07883dec7a

                                                  SHA256

                                                  506b35d601c44a15b3a3b2cb04c9238a7908fb7864672cfc362760095b9756aa

                                                  SHA512

                                                  43c7b62bf7e92db637dd7dc6593f8564ff1ad9c92383dbf172800e29b8a571c2c8a6907b8443b05cbfefe50b851c1063c2906755bc1599be9d344b08acf9d00a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\d04eb9ef-906f-4dbb-94b0-fe7ccff8763d

                                                  Filesize

                                                  648B

                                                  MD5

                                                  f02b4ea59fd63a44a12fbad64f2a35c8

                                                  SHA1

                                                  9c5fe064c2e863ce750bede1c9267c7e1aaef04a

                                                  SHA256

                                                  450dcd94680a3a7240081103445136bc8d1acaeef813f082c8628344303c8130

                                                  SHA512

                                                  57e34d619665d65dd5853aa67be34470b9902a295227288b3de0b1f4aece51531c4ae33ba707735a0e7e5fca095ec9b39e309f09517e08442a081ae6927b2071

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\ef9a364f-50ef-4779-94e0-6c297ddc6472

                                                  Filesize

                                                  648B

                                                  MD5

                                                  80d8b12ac8ab353203727652f06b30fc

                                                  SHA1

                                                  17f91efb959d8268b37d90d76098f9a93ee599df

                                                  SHA256

                                                  aced9a672ea541b06bc3fc3f3bf7a23daee0203d7ba89aa01f2822138f4a30dc

                                                  SHA512

                                                  a72a7da2607bf38956ddf208a066a2d16dedd76875f474ee1b520dbc895283668d1ce539ca0ea9ca15f6f2906b5add1e181e73c2092568198eb1ad0e2f0d549a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  f360f42d55bd4be945dd87c7b946319d

                                                  SHA1

                                                  815960bc1221db704aa9e9ed0ace703ad206ace0

                                                  SHA256

                                                  2f0644ca3dc6a2b4d5f6fa3f440cd5c3f3af785a52db8e7c0c087bf85c256b8e

                                                  SHA512

                                                  95b00ac2c68bc2dfa29eb0c8633731ed6906afb44689c02f971c1caa51acec4b49c1c4c490c0f67635e620aa9c2630e973e4eeca9f7eb28afccba9440d837ff5

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  86bc483f3bf3c87616e4558ffbcb62f0

                                                  SHA1

                                                  f9d05fad75fcd779495f39ac4c0eab24512f8231

                                                  SHA256

                                                  ef827e4443894063b7c6f4ddffd983f8b290896348eebc48b0a6d6c6a7fb78e2

                                                  SHA512

                                                  cfbc511e46e794ab2d45ab4f5902cb11b4cd730e1fc8b4a49d3f51821fc37c385be86086af9f11cd38d6a35c9a3eb89480465c40f48d10a3fb2a4347b66bfbe4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionCheckpoints.json

                                                  Filesize

                                                  204B

                                                  MD5

                                                  3e62554c9f218730ddf20915068266c9

                                                  SHA1

                                                  b19fc85839713623f0d0206870f88d9173705523

                                                  SHA256

                                                  c40d1a8460187b4e8f141f324e3a988805af7983606dd605ee2aef1cfc07e695

                                                  SHA512

                                                  31c099d65dfbb1c2fa33a5f6dc2fd088599f9ac2ed093320dccedffe447772817ea6c7e4c99037a927a941fc8e0722b25f04e679a848d4de43c8d8d49d02cf1d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionCheckpoints.json

                                                  Filesize

                                                  53B

                                                  MD5

                                                  ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                  SHA1

                                                  b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                  SHA256

                                                  792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                  SHA512

                                                  076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionCheckpoints.json

                                                  Filesize

                                                  90B

                                                  MD5

                                                  c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                  SHA1

                                                  5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                  SHA256

                                                  00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                  SHA512

                                                  71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  5690e002e4390070c2ed1a013fd4f966

                                                  SHA1

                                                  7eb4eb6a9437bb79e0153b83adafad27fe542dac

                                                  SHA256

                                                  828f829fbb55c26ae9a19ebf4a2abc8b474cacc113004d73b2c6093dd47ad0b8

                                                  SHA512

                                                  7f5b441d44b68b9d78dcbb88d053c3ef80f60e8f16689ff4042fca2c6bf09e3ce2871620ce395507731629a39b5e4f1b0ea48d76a61d2dd2db7d614573f36e64

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  1f11e192656380c647f5184b57a34004

                                                  SHA1

                                                  d1cbcc64d1c1612ac331b3de5a97aff9109577f7

                                                  SHA256

                                                  0ff13a2d3bf33c2618f7c44add520b0d9632d142fd43c0a0ff48a574dc669f46

                                                  SHA512

                                                  73ca15b8661533776343b27fe3f428fd37ea11b3cf546f43b254622a02a3eff01ab0f338880e192572e3d2dc46e3d3e27941b75fa9afa0eba225271df4e0db31

                                                • C:\Users\Admin\AppData\Roaming\d3d9.dll

                                                  Filesize

                                                  534KB

                                                  MD5

                                                  a6da8d868dbd5c9fe6b505db0ee7eb71

                                                  SHA1

                                                  3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                  SHA256

                                                  4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                  SHA512

                                                  132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  df35b1229e045b7cfd9b9576c7af6a0a

                                                  SHA1

                                                  4d685fce7540a4ec10853b20987ca8831e5f184b

                                                  SHA256

                                                  8168f2470bb7a27e3a09aaa7e8748b2150e4e96a76f6017214c8392d907ce2bc

                                                  SHA512

                                                  8b8ebc2f658180edec34e20337491bd60829832110d1be28e08544afa2707b8b064933ac8662f524b88b4e0c79776df526e44a786ccc04388271ba9013c1dc55

                                                • C:\Users\Public\Desktop\Google Chrome.lnk

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  353e9e2fa47d7a9c14a35cceac0360b3

                                                  SHA1

                                                  18c41db29a4c28597f096ba252868cb57186eff1

                                                  SHA256

                                                  a402c8dac3b12da5d655c7b3dcd6483fa998dc33fb49c8fcf8ec0d63fc4bacbf

                                                  SHA512

                                                  60a044bcdff9cdaf3ac7011e5ca6eca8ce4657db73a1d428008ea153f890e679dce2474917666290764545effb6215b4f4a836304c03ebf1e32da354b685c7ed

                                                • \??\c:\Users\Admin\AppData\Local\Temp\4vnbccwa\4vnbccwa.0.cs

                                                  Filesize

                                                  580B

                                                  MD5

                                                  d83df3d6161b621f56402401dddd6195

                                                  SHA1

                                                  4a658a72eae666d8e1431bec08cf8be55a4180c4

                                                  SHA256

                                                  940b2536894a381f4eaeeda3289a969ef8c50e2c3988ffdee26b4fc70cc18f37

                                                  SHA512

                                                  b7280b953c85e054387a6e5429aef3e607c6332621983cdfbd01277c40fb54af07a2badb0743270104a5d17c99eaa9438072abbda728f8104ea634642fff6a2d

                                                • \??\c:\Users\Admin\AppData\Local\Temp\4vnbccwa\4vnbccwa.cmdline

                                                  Filesize

                                                  369B

                                                  MD5

                                                  ff6789a2555c6195992b3b9a1a17307f

                                                  SHA1

                                                  72b7a0b118349bb259a315f2f96ef826fc80b9b3

                                                  SHA256

                                                  0f00c20785d99b7e72ade48572420b1df7db11599a2c20df96851100afc8c084

                                                  SHA512

                                                  72d2f6b5e1525cf9b16f6b8b815709e0c3a3d30d82552370587cf09b8ec018f43f133be486ba4871bf6a38ab02e1b06ec397ef0bff95fa9fc102887e9ea02dfb

                                                • \??\c:\Users\Admin\AppData\Local\Temp\4vnbccwa\CSC84D2464B2E75494C915F9E4CDF343A13.TMP

                                                  Filesize

                                                  652B

                                                  MD5

                                                  8b938b16609d1cb690c1efb8b40251e4

                                                  SHA1

                                                  35659c48e7fbede09e04158c32532c61ecd000af

                                                  SHA256

                                                  9859e896fd35a6fd4fd99956a0724e53885f5f810217b4f732cc83d46c54cc52

                                                  SHA512

                                                  f0c52b9f8ec1fc94ff1141aed1bdd5e9ec6eff032bd4178c20202b6943c3b7b5715f31760a16e6887c78b27bf4ed63eb32e59249dc979360943f8e01dcfb7776

                                                • memory/624-1023-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/624-1001-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/744-21-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-618-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-732-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-42-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-730-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-725-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-40-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-723-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-23-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-1396-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-22-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-706-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-19-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-20-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-59-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-661-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-18-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-1380-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-762-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-950-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-686-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-1089-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/744-63-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/884-617-0x0000000006F70000-0x0000000006FBC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/884-613-0x0000000006FD0000-0x00000000075E8000-memory.dmp

                                                  Filesize

                                                  6.1MB

                                                • memory/884-591-0x0000000005000000-0x0000000005092000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/884-616-0x0000000006F30000-0x0000000006F6C000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/884-615-0x0000000006ED0000-0x0000000006EE2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/884-592-0x00000000051B0000-0x00000000051BA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/884-614-0x0000000008850000-0x000000000895A000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/884-588-0x0000000000400000-0x0000000000452000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/884-610-0x0000000006640000-0x000000000665E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/884-609-0x0000000005E80000-0x0000000005EF6000-memory.dmp

                                                  Filesize

                                                  472KB

                                                • memory/1208-41-0x0000000005190000-0x0000000005191000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1208-38-0x0000000000540000-0x0000000000BDA000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/1208-43-0x0000000000541000-0x0000000000564000-memory.dmp

                                                  Filesize

                                                  140KB

                                                • memory/1208-44-0x0000000000540000-0x0000000000BDA000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/1872-996-0x00000000007C0000-0x0000000000814000-memory.dmp

                                                  Filesize

                                                  336KB

                                                • memory/1912-731-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-549-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-1391-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-1374-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-735-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-1081-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-729-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-724-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-719-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-941-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-697-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-682-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-635-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1912-636-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3060-938-0x0000000000400000-0x0000000000454000-memory.dmp

                                                  Filesize

                                                  336KB

                                                • memory/3060-940-0x0000000000400000-0x0000000000454000-memory.dmp

                                                  Filesize

                                                  336KB

                                                • memory/3484-585-0x0000000000720000-0x0000000000774000-memory.dmp

                                                  Filesize

                                                  336KB

                                                • memory/3748-1003-0x0000000000400000-0x0000000000452000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/3752-90-0x00000000066B0000-0x00000000066CA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/3752-93-0x0000000008650000-0x0000000008CCA000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/3752-74-0x0000000005A20000-0x0000000005A86000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/3752-85-0x0000000005BB0000-0x0000000005F04000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/3752-86-0x0000000006160000-0x000000000617E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/3752-87-0x00000000061A0000-0x00000000061EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/3752-89-0x00000000073D0000-0x0000000007466000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/3752-91-0x0000000006720000-0x0000000006742000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/3752-92-0x0000000007A20000-0x0000000007FC4000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/3752-150-0x0000000004EA0000-0x0000000004EA8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/3752-71-0x0000000002870000-0x00000000028A6000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/3752-73-0x00000000052C0000-0x00000000052E2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/3752-72-0x0000000005300000-0x0000000005928000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/3752-75-0x0000000005B40000-0x0000000005BA6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/3896-1053-0x0000000005D00000-0x0000000005D1A000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/3896-903-0x0000000000280000-0x00000000002F8000-memory.dmp

                                                  Filesize

                                                  480KB

                                                • memory/4056-1109-0x000000000A630000-0x000000000AB5C000-memory.dmp

                                                  Filesize

                                                  5.2MB

                                                • memory/4056-1108-0x0000000009F30000-0x000000000A0F2000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/4056-884-0x0000000000B90000-0x0000000000C10000-memory.dmp

                                                  Filesize

                                                  512KB

                                                • memory/4104-3-0x00000000005A0000-0x0000000000A6D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4104-0-0x00000000005A0000-0x0000000000A6D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4104-2-0x00000000005A1000-0x00000000005CF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/4104-17-0x00000000005A0000-0x0000000000A6D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4104-1-0x0000000077954000-0x0000000077956000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/4104-4-0x00000000005A0000-0x0000000000A6D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4308-62-0x0000000000210000-0x00000000008AA000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/4308-60-0x0000000000210000-0x00000000008AA000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/4340-543-0x0000000000D00000-0x00000000011A9000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4340-311-0x0000000000D00000-0x00000000011A9000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4956-1442-0x00000000007E0000-0x0000000001272000-memory.dmp

                                                  Filesize

                                                  10.6MB

                                                • memory/4980-906-0x0000000000400000-0x0000000000643000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/4980-1386-0x0000000000400000-0x0000000000643000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/4980-1072-0x0000000000400000-0x0000000000643000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/4980-909-0x0000000000400000-0x0000000000643000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/4980-910-0x0000000000400000-0x0000000000643000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/5424-778-0x0000000000670000-0x00000000008B3000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/5424-912-0x0000000000670000-0x00000000008B3000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/5424-779-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/5540-1107-0x00000000054B0000-0x000000000554C000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/5540-1106-0x00000000001D0000-0x0000000000C16000-memory.dmp

                                                  Filesize

                                                  10.3MB

                                                • memory/5560-712-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5560-710-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5564-714-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5564-709-0x00000000007E0000-0x0000000000C89000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5616-1381-0x0000000000400000-0x0000000001064000-memory.dmp

                                                  Filesize

                                                  12.4MB

                                                • memory/5640-1045-0x0000000000FA0000-0x000000000163A000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5640-1052-0x0000000000FA0000-0x000000000163A000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5752-1397-0x0000000004360000-0x00000000043D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/5752-1395-0x0000000004360000-0x00000000043D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/5752-1398-0x0000000004360000-0x00000000043D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/5752-1394-0x0000000004360000-0x00000000043D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/5752-1393-0x0000000004360000-0x00000000043D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/5808-911-0x0000000000400000-0x000000000081B000-memory.dmp

                                                  Filesize

                                                  4.1MB

                                                • memory/5964-1002-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5964-1025-0x0000000000450000-0x000000000091D000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/6056-931-0x0000000000460000-0x000000000050E000-memory.dmp

                                                  Filesize

                                                  696KB