Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 21:18

General

  • Target

    45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe

  • Size

    1.8MB

  • MD5

    2d19492cf956ebf1ce662e5912b07367

  • SHA1

    dea9da4251fefcf2d49759177f89675fb4ed32b9

  • SHA256

    45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452

  • SHA512

    ae1649fff4f87322a54c6394e1ebd0439201648bc88fd5f9984bd0e88ef690c16c5957f18afd4b290a435f8778cd9f96328c2ab570b5dfd5c834fcae25c0b749

  • SSDEEP

    49152:fjR6USUBfqc1I3Dk711hKTu75O5AEF+qJtXcmoR:fj9/yI71TKTaQaEYmX

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

lumma

C2

https://drawwyobstacw.sbs

https://condifendteu.sbs

https://ehticsprocw.sbs

https://vennurviot.sbs

https://resinedyw.sbs

https://enlargkiw.sbs

https://allocatinow.sbs

https://mathcucom.sbs

https://clearancek.site

https://licendfilteo.site

https://spirittunek.store

https://bathdoomgaz.store

https://studennotediw.store

https://dissapoiznw.store

https://eaglepawnoy.store

https://mobbipenju.store

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe
    "C:\Users\Admin\AppData\Local\Temp\45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4608
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 1252
            5⤵
            • Program crash
            PID:4372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 288
          4⤵
          • Program crash
          PID:2424
      • C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3208
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Users\Admin\AppData\Roaming\iLFrehSxNU.exe
            "C:\Users\Admin\AppData\Roaming\iLFrehSxNU.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4628
          • C:\Users\Admin\AppData\Roaming\zBmqxA13oB.exe
            "C:\Users\Admin\AppData\Roaming\zBmqxA13oB.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 264
          4⤵
          • Program crash
          PID:3224
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3596
      • C:\Users\Admin\AppData\Local\Temp\1000354001\2b8b64e31e.exe
        "C:\Users\Admin\AppData\Local\Temp\1000354001\2b8b64e31e.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:216
      • C:\Users\Admin\AppData\Local\Temp\1000355001\6303ec316f.exe
        "C:\Users\Admin\AppData\Local\Temp\1000355001\6303ec316f.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4396
          • C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe
            "C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\1000349001\fc74e404e3.exe
            "C:\Users\Admin\AppData\Local\Temp\1000349001\fc74e404e3.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1512
              6⤵
              • Program crash
              PID:2072
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1492
              6⤵
              • Program crash
              PID:4448
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1040
              6⤵
              • Program crash
              PID:3192
          • C:\Users\Admin\1000350002\9305d339ae.exe
            "C:\Users\Admin\1000350002\9305d339ae.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3416
          • C:\Users\Admin\AppData\Local\Temp\1000357001\ff06f8f9e7.exe
            "C:\Users\Admin\AppData\Local\Temp\1000357001\ff06f8f9e7.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Windows security modification
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3944
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000360041\do.ps1"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4752
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
              6⤵
                PID:3148
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:5032
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aaaca048-8e37-40fb-ace4-dc1ff0024742} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" gpu
                    8⤵
                      PID:1092
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea6c4f47-25ff-4ac1-b45b-9358ef94a2e1} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" socket
                      8⤵
                        PID:900
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3348 -childID 1 -isForBrowser -prefsHandle 3340 -prefMapHandle 3336 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf3eb73e-83c6-4c9c-acdf-03599fc35322} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab
                        8⤵
                          PID:5948
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 2 -isForBrowser -prefsHandle 2616 -prefMapHandle 3256 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1107231a-87f6-4728-b15f-ae809aff2500} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab
                          8⤵
                            PID:3212
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4212 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4168 -prefMapHandle 4204 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b195ed15-f03b-4c5b-a047-92665075f233} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" utility
                            8⤵
                            • Checks processor information in registry
                            PID:5880
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5076 -childID 3 -isForBrowser -prefsHandle 5072 -prefMapHandle 4968 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cd3d772-5bfc-49fe-8593-2d76976354c6} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab
                            8⤵
                              PID:7020
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5236 -childID 4 -isForBrowser -prefsHandle 5312 -prefMapHandle 5308 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71c0024b-a54a-48c7-92e2-a8ba6aa713df} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab
                              8⤵
                                PID:7032
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 5 -isForBrowser -prefsHandle 5412 -prefMapHandle 5416 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80456bec-452c-47ef-b6bb-b20799237d22} 5032 "\\.\pipe\gecko-crash-server-pipe.5032" tab
                                8⤵
                                  PID:7044
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                            5⤵
                              PID:3652
                        • C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2712
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Modifies system certificate store
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2276
                        • C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe"
                          3⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4120
                          • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                            "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:552
                        • C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe"
                          3⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:912
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c start context.exe
                            4⤵
                              PID:3148
                              • C:\Users\Admin\AppData\Local\Temp\context.exe
                                context.exe
                                5⤵
                                • Drops startup file
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4532
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                  6⤵
                                    PID:6352
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6364
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "InstallUtil.exe" && timeout 1 && del InstallUtil.exe && Exit"
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:6540
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im "InstallUtil.exe"
                                        8⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:6580
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout 1
                                        8⤵
                                        • System Location Discovery: System Language Discovery
                                        • Delays execution with timeout.exe
                                        PID:6668
                            • C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe"
                              3⤵
                              • Drops startup file
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3316
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3508
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /k "taskkill /f /im "InstallUtil.exe" && timeout 1 && del InstallUtil.exe && Exit"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:6716
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "InstallUtil.exe"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5400
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout 1
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Delays execution with timeout.exe
                                    PID:5412
                            • C:\Users\Admin\AppData\Local\Temp\1000424001\app.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000424001\app.exe"
                              3⤵
                              • Checks computer location settings
                              • Drops startup file
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3100
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5440
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3704
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 804 -ip 804
                          1⤵
                            PID:3172
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3208 -ip 3208
                            1⤵
                              PID:4760
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4608 -ip 4608
                              1⤵
                                PID:4948
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3980 -ip 3980
                                1⤵
                                  PID:5064
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3980 -ip 3980
                                  1⤵
                                    PID:4084
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3980 -ip 3980
                                    1⤵
                                      PID:3504
                                    • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                      C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                      1⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:5108
                                      • C:\Users\Admin\AppData\Local\Temp\1000086001\JavUmar.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000086001\JavUmar.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:5980
                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4600
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2084
                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:6300
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:6296

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\mozglue.dll

                                      Filesize

                                      593KB

                                      MD5

                                      c8fd9be83bc728cc04beffafc2907fe9

                                      SHA1

                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                      SHA256

                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                      SHA512

                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                    • C:\ProgramData\nss3.dll

                                      Filesize

                                      2.0MB

                                      MD5

                                      1cc453cdf74f31e4d913ff9c10acdde2

                                      SHA1

                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                      SHA256

                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                      SHA512

                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                      Filesize

                                      1KB

                                      MD5

                                      def65711d78669d7f8e69313be4acf2e

                                      SHA1

                                      6522ebf1de09eeb981e270bd95114bc69a49cda6

                                      SHA256

                                      aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                      SHA512

                                      05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      16KB

                                      MD5

                                      741d5aecdeddcb8e3fd36d08d663b9ee

                                      SHA1

                                      fe6c78df084b2d99b5d1600738d2cf6e26927477

                                      SHA256

                                      4d3aa792a9dea97412e05d1dd21da6ca2af5505cd8cd115fb3cef199efd146fb

                                      SHA512

                                      e452dc08f7806c3967c9a5238a5e2146479374bb0509b50c2b2f3974007a7df3fafc18aeeb15974a3b20a8cdfd24278d4f27e7a62cf49b0da28c270864ad2b1e

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp

                                      Filesize

                                      22KB

                                      MD5

                                      7ad8a99d6c71985f87951dfb2ef8bba4

                                      SHA1

                                      84864b9747e5db912d58d56b1f0631bfe828ea41

                                      SHA256

                                      6dcaf2cd8e4db898bf6329169854a8ec1fe379c2488a5f5523b7ee7b9b172689

                                      SHA512

                                      df7e3cf99ee7118c23b29760b91d705123384e86ec2a53ecc07d08a520aa937cd82f7ee20eb3ff137d9c15e3857942d51d464d7687327e263d2ba373ff04c18d

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\0305BF7FE660AF5F32B4319E4C7EF7A7B70257A3

                                      Filesize

                                      13KB

                                      MD5

                                      ec588975d51a74c00a61e70ebfe90d3f

                                      SHA1

                                      4cfc253bf923bfa6e08bab0686243dcf002cf499

                                      SHA256

                                      852331b5ab6ff47bd14b8924ae01c35ef3118db14c3f3ab470eee99b83c66c08

                                      SHA512

                                      e102076d232e1d9951dc8a08f64b59b78cf8f16d4eaba56fa2a793072c40e59163f8798c84d2c21f9cce4320563c8419de6af6203f2f07419f228b1ca1470538

                                    • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                      Filesize

                                      566KB

                                      MD5

                                      049b6fe48a8cfb927648ad626aba5551

                                      SHA1

                                      9555d23104167e4fad5a178b4352831ce620b374

                                      SHA256

                                      b78402483c46cd37e2c204d95690aa2a213616a1f904d779ceec0e22fcdd6531

                                      SHA512

                                      ed787f90966ca1ea4b1e67c4026dd44393c7d312cd52e376f4ba5e5c49616938ec9e913044def29b40b441eb4c913a5134bb78317a179f62067bef3f9d913c7e

                                    • C:\Users\Admin\AppData\Local\Temp\1000004001\legas.exe

                                      Filesize

                                      1.4MB

                                      MD5

                                      e6d27b60afe69ac02b1eaec864c882ae

                                      SHA1

                                      a72b881867b7eaa9187398bd0e9e144af02ffff4

                                      SHA256

                                      aac36ff20ea7bfc0591c1d6b145b456bad394ee8e619343ec10d1809188edd75

                                      SHA512

                                      4f11fc2b36589fc9ff7dc5afd27cb91614f6a89bfd60942baebef025f53cb56ed7413abeff57fc7c85b3a2a4b0feec2649d5c5a856d3e2e9c13f6a0d8c777764

                                    • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                      Filesize

                                      307KB

                                      MD5

                                      68a99cf42959dc6406af26e91d39f523

                                      SHA1

                                      f11db933a83400136dc992820f485e0b73f1b933

                                      SHA256

                                      c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                      SHA512

                                      7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                    • C:\Users\Admin\AppData\Local\Temp\1000086001\JavUmar.exe

                                      Filesize

                                      7.2MB

                                      MD5

                                      3195fa517818ae805403fc975213e9b4

                                      SHA1

                                      43f5dbcd65c3e8fcbf106f4acd95ee26acd5c5ac

                                      SHA256

                                      d8689dcc36f611d77d6f6d1eb1ed8b872104a38568740936209114835a441048

                                      SHA512

                                      8c6036e280f7d201563ad0d7cf6050d581641741ce2a9a1380ceddae6791ea8ec73b49e6f3ba2ecca912dc8bdace75d43874d3e59699d22a46108c727650f17d

                                    • C:\Users\Admin\AppData\Local\Temp\1000336001\num.exe

                                      Filesize

                                      307KB

                                      MD5

                                      791fcee57312d4a20cc86ae1cea8dfc4

                                      SHA1

                                      04a88c60ae1539a63411fe4765e9b931e8d2d992

                                      SHA256

                                      27e4a3627d7df2b22189dd4bebc559ae1986d49a8f4e35980b428fadb66cf23d

                                      SHA512

                                      2771d4e7b272bf770efad22c9fb1dfafe10cbbf009df931f091fb543e3132c0efda16acb5b515452e9e67e8b1fc8fe8aedd1376c236061385f026865cdc28d2c

                                    • C:\Users\Admin\AppData\Local\Temp\1000349001\fc74e404e3.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      d19345cd180657fc5e0f539927f4706b

                                      SHA1

                                      6ac5758e35620fdfef31f4bc80eba03fff331788

                                      SHA256

                                      0ca0ec137646d7269694093511a02f57650d7c35b40d6a403a935582931a546d

                                      SHA512

                                      9304640806230190f286d06429b425b572dc7b81b715e0e0001d209a3ca529185e7c6e52e0948e5d56f749854a81b70e9cb80d86ce31246b284aa7520e061cef

                                    • C:\Users\Admin\AppData\Local\Temp\1000354001\2b8b64e31e.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      5dfa05b60c45476fdd8f39b1e93fc8a1

                                      SHA1

                                      06a4d1a3410b1e6909e22025aab5de356469d950

                                      SHA256

                                      1507aa5ff5c2a39351daed1d71ea68d1f069f3f6c4cacd11fffc27173cb6f495

                                      SHA512

                                      05755a8d7c23a5f160c0cc3a7f43303638e7b83542808257de88539e56955678a234d738f7f9b291ef8d4c0929cc9228e9f495840c7b89855c115c06a250b0d8

                                    • C:\Users\Admin\AppData\Local\Temp\1000355001\6303ec316f.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      9d56af6516a7e9070041d692733b7a2d

                                      SHA1

                                      64e80f2c78f94c696b0dfd74a9b9904a785bb7be

                                      SHA256

                                      699ecf232e1e83f0518f035771c993bdf4a2937753e7f939b9bc7cda7b928a63

                                      SHA512

                                      5bb0853dc3e95613158f2147c8fc74e9ba3df5ae9b5809ac250eba5325f812b06784b216130a60ed560f1a7dd21abee24dc465ad671485fd9bcc467681ffd4bf

                                    • C:\Users\Admin\AppData\Local\Temp\1000357001\ff06f8f9e7.exe

                                      Filesize

                                      1.6MB

                                      MD5

                                      9f875cd80ee26b55a71c2f795eb01c33

                                      SHA1

                                      e71f7e13477c83c59c50cb975c3d893dae12d2ff

                                      SHA256

                                      a599f8e501bc4a1a7f1ed10b05b5b6fe4c6f13c40c1065af952740880123bfb9

                                      SHA512

                                      811ab159ef2868b6458f53784e639020eff3411f5063d76497d91a519ed78976e139d9deb726aef6acf2c6cc06838abf302875905dc9d4c1ef4f5e8802602394

                                    • C:\Users\Admin\AppData\Local\Temp\1000360041\do.ps1

                                      Filesize

                                      2KB

                                      MD5

                                      65d1b33f6758ea511e3ed01f2cb74e53

                                      SHA1

                                      efa0e4d34c0d9bc719ef98ed5e145d8e50164916

                                      SHA256

                                      233dc91536e57adbb2153512f56f098db701e43a7768508c9e9f290c952f1319

                                      SHA512

                                      2772e2659aa2ffb6f86b1198d2a1652d7cb7a07ccfb249a96f7cb649594ba5ab1cc44389d505c9aca9f6ad9afda59d2abc565db5ae89b77f675155afe069103d

                                    • C:\Users\Admin\AppData\Local\Temp\1000399001\MK.exe

                                      Filesize

                                      314KB

                                      MD5

                                      ff5afed0a8b802d74af1c1422c720446

                                      SHA1

                                      7135acfa641a873cb0c4c37afc49266bfeec91d8

                                      SHA256

                                      17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                      SHA512

                                      11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                    • C:\Users\Admin\AppData\Local\Temp\1000406001\Nework.exe

                                      Filesize

                                      416KB

                                      MD5

                                      f5d7b79ee6b6da6b50e536030bcc3b59

                                      SHA1

                                      751b555a8eede96d55395290f60adc43b28ba5e2

                                      SHA256

                                      2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                      SHA512

                                      532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                    • C:\Users\Admin\AppData\Local\Temp\1000407001\processclass.exe

                                      Filesize

                                      6KB

                                      MD5

                                      c042782226565f89ce3954489075e516

                                      SHA1

                                      256dd5ba42837a33c7aa6cb71cef33d5617117ee

                                      SHA256

                                      a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6

                                      SHA512

                                      9f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd

                                    • C:\Users\Admin\AppData\Local\Temp\1000409001\splwow64.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      ed9393d5765529c845c623e35c1b1a34

                                      SHA1

                                      d3eca07f5ce0df847070d2d7fe5253067f624285

                                      SHA256

                                      53cd2428c9883acca7182781f22df82c38f8cc115dc014b68e32f8b1cdbf246a

                                      SHA512

                                      565f66ef604b10d5be70920d9813e58f5bde174d6a6d30eb8654f467775da8a665c555b7e4127fc22f8a5a5b54466137bde228fd932335517dd017d0ea51f3f8

                                    • C:\Users\Admin\AppData\Local\Temp\1000424001\app.exe

                                      Filesize

                                      20.4MB

                                      MD5

                                      7172ee8de6490094d4a5112eceaaaa90

                                      SHA1

                                      46a82d7628f31d91fb883056dfbd4d15d26bbd77

                                      SHA256

                                      11cabbb368deb30bc1f45feb6509b222c2b360707ff31c8b1e056c617477f28e

                                      SHA512

                                      91e2da0921f8d2596ac2e99e91b108e4d7dba6a97800c775bc9d9b4411fae3b7f0d811f48b107054664aff69c7cdd2c052220960cec9c525470f7266de5780d8

                                    • C:\Users\Admin\AppData\Local\Temp\409013623608

                                      Filesize

                                      83KB

                                      MD5

                                      a60c51269a8ef5af12ab94790887fcc6

                                      SHA1

                                      dc0580b8c6712a35b1680a3a22c796c5ece6d5f0

                                      SHA256

                                      30579a593384988575d1721558287951666fd06005960bbdc893fd26cc960c39

                                      SHA512

                                      495e76e014ce4218a997503559c0fd80f9269ee21d9a904e73791ebafc0b715a6d07f269456e8ad41eca6db0ec94ce72691616dbaca09130a31a1579faad94ec

                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      2d19492cf956ebf1ce662e5912b07367

                                      SHA1

                                      dea9da4251fefcf2d49759177f89675fb4ed32b9

                                      SHA256

                                      45fb50b593faf530aa26cfd2e5ba7e3b0744ae9b7e6921c6aa8021ed7f90f452

                                      SHA512

                                      ae1649fff4f87322a54c6394e1ebd0439201648bc88fd5f9984bd0e88ef690c16c5957f18afd4b290a435f8778cd9f96328c2ab570b5dfd5c834fcae25c0b749

                                    • C:\Users\Admin\AppData\Local\Temp\Tmp4CD.tmp

                                      Filesize

                                      2KB

                                      MD5

                                      1420d30f964eac2c85b2ccfe968eebce

                                      SHA1

                                      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                      SHA256

                                      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                      SHA512

                                      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x4nvry0s.0py.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      479KB

                                      MD5

                                      09372174e83dbbf696ee732fd2e875bb

                                      SHA1

                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                      SHA256

                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                      SHA512

                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                      Filesize

                                      13.8MB

                                      MD5

                                      0a8747a2ac9ac08ae9508f36c6d75692

                                      SHA1

                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                      SHA256

                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                      SHA512

                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Office Manager.url

                                      Filesize

                                      70B

                                      MD5

                                      1c5c0d2105718982915d88e1e34b7c24

                                      SHA1

                                      ecb11df5274a3a37c81fc19b95ec316d39bb6f03

                                      SHA256

                                      b5fd05a1a23d90dee32a1f61158a1e0859fde6882b289267c90845bb995b0c09

                                      SHA512

                                      9e1f86ca561c034078acbce22e6b3b2dc938a883f4897167c96ad7c61f28d30075d66557335825c18a00f96467fbd1dee067bb756388ba60b21443ba964ba331

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                      Filesize

                                      8KB

                                      MD5

                                      e844e2319d55dd3e717e7a4d3694efcb

                                      SHA1

                                      d243056e872e19c45fd11df6c18bec799ad847ab

                                      SHA256

                                      103720874ea030d6924e9ebf9dbb2f481a2c2bdcb299c317c16ed99546acd3b8

                                      SHA512

                                      b5e2a71d4bedf4402fe4fee0ec2bc923665b6bbf98eaea3768fac7841dc72c4bc136aabbcacdf463d6c6e2160503aa7a86b949d6c57734f2cfd60b89ec16ef90

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                      Filesize

                                      13KB

                                      MD5

                                      30127f0d1df91cc5b0eb8cfeaafd2a4c

                                      SHA1

                                      a1901d07c03ce0d5b261edaf0cd90f6bf5dce12a

                                      SHA256

                                      1ec63b3ddf5147c582bcc77ac40bb177f2693750db3c0cd284116ce91e0a1bfb

                                      SHA512

                                      b53b00f6bd3f52b09e59cadba04848891fca70d040d648f784937b801b0ccc37093af85ba3201ffa7eb5c3032b0ddcb5ec9f2f3afe22a74145c21a1d3db2770b

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      15KB

                                      MD5

                                      fe11d30784579ad113b525f6d494f831

                                      SHA1

                                      ef97ce93e080baa77e33bb2312f32f48f0b3dc31

                                      SHA256

                                      67718d67a5dc4f4ff90533835fa0f93ffc19379ff08f6564df5cccf37b0c9503

                                      SHA512

                                      13ddbe826aa7fc96bf086fe64b77aaabcd2f2c0503f683410d783eec9e12f5663beb7ad8b7a91ba1742292c9f3c5315ac36f87c689306b8eaf76a2055fcb17bf

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      15KB

                                      MD5

                                      d824dbb73be44830e49846aafc304c5f

                                      SHA1

                                      8cd2d224085b4981750b01552ca0ff8d6f3ce012

                                      SHA256

                                      09675a5e2b6ed0347dabcd810aedd177bb0a1f3c8f95b30b1b1e0a0c8b9f73ba

                                      SHA512

                                      f621148752824e14aea082d5e1911e6386e869805a2b0e82c6e2c4de5d482b686666e06c22c86ccc66030b64e975818517d6c0d07221d71341fc0b2386c16103

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      f3703d46cc7d56be59a7dada5dfb6066

                                      SHA1

                                      3f51137a949a3b7dcb1b83b2abe4d3c95687742d

                                      SHA256

                                      ae8c5a59e62bcd828589ed76c3280bb0a0806cab7fd749be4f16b027fe809321

                                      SHA512

                                      d10d21f6207d1020dea9ca2c3db80f6e27edea1b2542ae886887d26ca23e7d23ef7f83a940e1884e4fd1bc5976cedc578f7cb814ffd514affdf7e2537d32eb12

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      6KB

                                      MD5

                                      f2317155eda080198129b8688d80d9c1

                                      SHA1

                                      adeffa276db981efb55b8340528a45bca4411980

                                      SHA256

                                      93ea7a8924964bd6b14db57a84201a419ef1f4c75c4c622bba7f22555b2fc78d

                                      SHA512

                                      645ea2c0ebeeb78c1ba994df265f65fd45d7acfa74a768e20ef405c456b0a32a1c37e72fa4b4ff0374bd876d90a458a15959703fccf55ecab44db72326badceb

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      14KB

                                      MD5

                                      8fe2b7559bcb324d2db6278664ba9fbc

                                      SHA1

                                      3014c7317b6ba2a6f6e45c8b5468011afac67485

                                      SHA256

                                      c3e7ff4ab504e099d1cf7e743081962db7469b4e86dce6c4ae07fe938726b2b1

                                      SHA512

                                      363deaeb094816857fe3d48493b0e9ac50ed131abbe10ee1b3c468544a05c3c3bdea4f506a3d4562b34f69fa5a5199f7291831e38a532346b482a009f346edf0

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1385d8a2-6434-424c-bc34-459622d1c20e

                                      Filesize

                                      28KB

                                      MD5

                                      7782dcec599593cd30a23338d2f4970a

                                      SHA1

                                      46aa8ebc5616ad22222ccfe608758da5c6502ca4

                                      SHA256

                                      4e948dde67ec03a3147e9ba16e2cfe5e3dd5e7e6c58c1d43baa8983301573baa

                                      SHA512

                                      393609804bbe159600ba59046cee4dc0ec6b4e956bdce5e00d81d2ce94d3bb6b654b5f5a0171626afd420f54167c5a021247f76c254bc7e983ad71c019620eab

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\3e30f049-2add-4275-bdfd-f591bfb34514

                                      Filesize

                                      671B

                                      MD5

                                      193ef28a4dcf786e984b2f1bb767bb71

                                      SHA1

                                      09140aef0ae7875753163e32ea21de9d5bead2e3

                                      SHA256

                                      50915c5e311badc355dfa080045403b9d606c155eec09bd36ddcf107a8f302e7

                                      SHA512

                                      f3d7f5b726cc10b35c936c54794444d61ab7cf268c87ee29137b02f5d2fa5e140c5f92dc74e68b566d07ea5dcf47f76055940a809d38d0651f317680dd217b0d

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\5743b9a7-3c21-428a-b3e0-e72bee56b953

                                      Filesize

                                      982B

                                      MD5

                                      2dd02f30c5b02622327d396a9eadbec7

                                      SHA1

                                      282f59caa6e75ddbcd33106cf4a02918ae86531c

                                      SHA256

                                      40f12839903d3c5f3db106910000d4c05603bdd7464a31d995d7e2bfac1a98e8

                                      SHA512

                                      58dad75ab634be3b5c66393224d078cb85e3b9a8db3396e35ad45b9c302c482e5b9ed0c42c38c90e8801931c2c8eefbc4feb45d0d99a578f6df75ac26656d532

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      842039753bf41fa5e11b3a1383061a87

                                      SHA1

                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                      SHA256

                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                      SHA512

                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      2a461e9eb87fd1955cea740a3444ee7a

                                      SHA1

                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                      SHA256

                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                      SHA512

                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      bf957ad58b55f64219ab3f793e374316

                                      SHA1

                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                      SHA256

                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                      SHA512

                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                      Filesize

                                      17.8MB

                                      MD5

                                      daf7ef3acccab478aaa7d6dc1c60f865

                                      SHA1

                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                      SHA256

                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                      SHA512

                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                      Filesize

                                      12KB

                                      MD5

                                      c24417f86f52b44c62d96daa4c6e06bc

                                      SHA1

                                      dbc293125aa7d62660f0ce4ff3bba374f918f36a

                                      SHA256

                                      8172b4a27d9d95fa29fc9d926cb2aac1b486ff21a4edd093daaa937e4e6f1908

                                      SHA512

                                      b8037af3b921a49d722b9537012e493688d8b536b2ced59e93303961af9e4a05791cd93d342db83486563c4461def94c64c251918a40e1cf88d81d5916e212e8

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                      Filesize

                                      10KB

                                      MD5

                                      5bee7e1e421f45751d20c30a7b2ff840

                                      SHA1

                                      d94ff0460a7f3e0fc818bfd0d90428fe5269fa35

                                      SHA256

                                      e3db0989a52e97e74ac230be0e9ebc078c6677d57119f8d11f353b98f7927033

                                      SHA512

                                      cd344d2aa429a996e5f789698749b306c04b3ccfb82e53cadc85a99f729ec5bc6693f114d662c53dc94a4b9cdebda983aa1b7a7c3edf299626612f9bfc635fc5

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                      Filesize

                                      15KB

                                      MD5

                                      dc78b2411a8250875a08e76ae7006d88

                                      SHA1

                                      bc3188acead6dea79e744ed5b8ff04e4be541c06

                                      SHA256

                                      445bfbccedfea1429ebedffcdd957f4abff9398fa964c3f05f8240df609d9f36

                                      SHA512

                                      4bf4486cab56909ea6b18a9c6693ad81b0c368f9561a000c659083a8d9a62bc6da6c8b356ec81deacf6cf8a707089a838d9014b0c17fd8bcff4d299a0db314e7

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                      Filesize

                                      10KB

                                      MD5

                                      cb625cba421d6277f5f109d0692f0f26

                                      SHA1

                                      4e765c8f80dc273c2c189842ca1b6317eb3de225

                                      SHA256

                                      288d4ac1bac9eacf28d22255520d5269374b31e257fda093e2e5d8cb34690282

                                      SHA512

                                      c802e58a2049b0e01ced6ad7b1932823e685861eee1bddae2486a807030d3534bbc3204522f12c115c6e70c06d00e9a8e0b3f2bedd93a165852a867a7ca9e0fb

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                      Filesize

                                      10KB

                                      MD5

                                      28b7a9c7b8e0eff01275158f10362e34

                                      SHA1

                                      688a4f6e7d5fffc19f553ccfa121d4c49f61df2a

                                      SHA256

                                      504117085fb58885e82bcd8e632b1e4f41bd22cd521e379a95291a83c24fd267

                                      SHA512

                                      14a700501dcf7c82429facecc1b117be66e5acaff338cd0b02ea4ccda14a1609468a3cdca00242d70fb9d4183d4bbb37b9bba7dab76bc4b69cdc9f1203a3edeb

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                      Filesize

                                      1.3MB

                                      MD5

                                      8f06f969b5797f4747661289508a8147

                                      SHA1

                                      a525cfcf8836ddd7376f6763cb7c50fb937f1dda

                                      SHA256

                                      3dc8edb33acc3b1e45fe9d7f59618c3f7fa66613873b858eb1c2622cc0b74090

                                      SHA512

                                      380d7e1ad1f69a79d850945ee304089151b32b83123b4637e9d2008b56340a9637b1b2264745fa87bfd38d552533523d65c3774e688e98e5aa75b3e58dd6b81c

                                    • C:\Users\Admin\AppData\Roaming\iLFrehSxNU.exe

                                      Filesize

                                      602KB

                                      MD5

                                      e4fc58d334930a9d6572c344e5129f6b

                                      SHA1

                                      d38fbd0c4c86eee14722f40cc607e2128c01b00f

                                      SHA256

                                      973a9056040af402d6f92f436a287ea164fae09c263f80aba0b8d5366ed9957a

                                      SHA512

                                      a69f5da8de8c9782769cca2e2fc5b28bbeba0c0d0027954dbe47b15610d82277abbe912f0e5921a18000f1a3a3c54eb5922f70c773537a22f4b35ff926d17a59

                                    • C:\Users\Admin\AppData\Roaming\zBmqxA13oB.exe

                                      Filesize

                                      393KB

                                      MD5

                                      7d7366ab79d6d3d8d83d13a8b30de999

                                      SHA1

                                      75c6c49a6701d254c3ce184054a4a01329c1a6f3

                                      SHA256

                                      3d66fed04c76d055c6149b33dcfda544b509c57087c57a861e1d6256b59f8465

                                      SHA512

                                      64f4551b3be1c21ce7c2d49608463e5aec4166e3e6893883c33a5b7d1109ef0fc8ab6bd15c70d9d606e2706f12a937c2d90d5bc8f6c629ad6f30f212dc25f022

                                    • memory/216-349-0x00000000006F0000-0x0000000000D94000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/216-380-0x00000000006F0000-0x0000000000D94000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/216-131-0x00000000006F0000-0x0000000000D94000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/216-363-0x00000000006F0000-0x0000000000D94000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/740-2-0x00000000000F1000-0x000000000011F000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/740-1-0x0000000077804000-0x0000000077806000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/740-4-0x00000000000F0000-0x00000000005A2000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/740-0-0x00000000000F0000-0x00000000005A2000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/740-17-0x00000000000F0000-0x00000000005A2000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/740-3-0x00000000000F0000-0x00000000005A2000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/804-47-0x00000000006A7000-0x00000000006A8000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/912-330-0x0000000000150000-0x0000000000158000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1980-70-0x0000000000400000-0x0000000000531000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1980-69-0x0000000000400000-0x0000000000531000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1980-68-0x0000000000400000-0x0000000000531000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1980-91-0x0000000000400000-0x0000000000531000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2084-455-0x00000000007D0000-0x0000000000C87000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2084-465-0x00000000007D0000-0x0000000000C87000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2276-289-0x0000000005F60000-0x0000000005FD6000-memory.dmp

                                      Filesize

                                      472KB

                                    • memory/2276-402-0x000000000A600000-0x000000000AB2C000-memory.dmp

                                      Filesize

                                      5.2MB

                                    • memory/2276-304-0x0000000006E50000-0x0000000006E62000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2276-301-0x0000000006F60000-0x0000000007578000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/2276-291-0x00000000065D0000-0x00000000065EE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/2276-308-0x0000000006EF0000-0x0000000006F3C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2276-257-0x00000000050B0000-0x00000000050BA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2276-306-0x0000000006EB0000-0x0000000006EEC000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/2276-401-0x0000000009F00000-0x000000000A0C2000-memory.dmp

                                      Filesize

                                      1.8MB

                                    • memory/2276-376-0x00000000069B0000-0x0000000006A16000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/2276-256-0x0000000005120000-0x00000000051B2000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/2276-254-0x0000000000400000-0x0000000000452000-memory.dmp

                                      Filesize

                                      328KB

                                    • memory/2276-302-0x00000000087E0000-0x00000000088EA000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/2276-384-0x00000000092A0000-0x00000000092F0000-memory.dmp

                                      Filesize

                                      320KB

                                    • memory/2712-230-0x0000000000A60000-0x0000000000AB4000-memory.dmp

                                      Filesize

                                      336KB

                                    • memory/2712-231-0x0000000005890000-0x0000000005E34000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/2968-18-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-52-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-204-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-19-0x0000000000571000-0x000000000059F000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/2968-382-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-24-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-437-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-26-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-20-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-25-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-21-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-22-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2968-23-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3100-1823-0x0000000007B70000-0x0000000007BBC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3100-524-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-1822-0x0000000007960000-0x0000000007A06000-memory.dmp

                                      Filesize

                                      664KB

                                    • memory/3100-538-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-513-0x0000000007760000-0x000000000788C000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/3100-536-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-522-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-2038-0x0000000005D40000-0x0000000005D94000-memory.dmp

                                      Filesize

                                      336KB

                                    • memory/3100-517-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-518-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-520-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-534-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-540-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-526-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-529-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-530-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3100-508-0x0000000000770000-0x0000000001BD6000-memory.dmp

                                      Filesize

                                      20.4MB

                                    • memory/3100-532-0x0000000007760000-0x0000000007885000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3156-375-0x0000000000810000-0x0000000000A71000-memory.dmp

                                      Filesize

                                      2.4MB

                                    • memory/3156-373-0x0000000000810000-0x0000000000A71000-memory.dmp

                                      Filesize

                                      2.4MB

                                    • memory/3316-350-0x0000000000430000-0x0000000000548000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3316-351-0x000000000AFA0000-0x000000000B024000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3416-418-0x0000000000670000-0x0000000000D14000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/3416-421-0x0000000000670000-0x0000000000D14000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/3508-512-0x0000000000400000-0x0000000000471000-memory.dmp

                                      Filesize

                                      452KB

                                    • memory/3508-511-0x0000000000400000-0x0000000000471000-memory.dmp

                                      Filesize

                                      452KB

                                    • memory/3508-514-0x0000000000400000-0x0000000000471000-memory.dmp

                                      Filesize

                                      452KB

                                    • memory/3596-326-0x0000000000ED0000-0x0000000001131000-memory.dmp

                                      Filesize

                                      2.4MB

                                    • memory/3596-111-0x0000000000ED0000-0x0000000001131000-memory.dmp

                                      Filesize

                                      2.4MB

                                    • memory/3596-132-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                      Filesize

                                      972KB

                                    • memory/3944-443-0x00000000005E0000-0x0000000000A30000-memory.dmp

                                      Filesize

                                      4.3MB

                                    • memory/3944-444-0x00000000005E0000-0x0000000000A30000-memory.dmp

                                      Filesize

                                      4.3MB

                                    • memory/3944-1829-0x00000000005E0000-0x0000000000A30000-memory.dmp

                                      Filesize

                                      4.3MB

                                    • memory/3944-442-0x00000000005E0000-0x0000000000A30000-memory.dmp

                                      Filesize

                                      4.3MB

                                    • memory/3944-1778-0x00000000005E0000-0x0000000000A30000-memory.dmp

                                      Filesize

                                      4.3MB

                                    • memory/3980-446-0x0000000000980000-0x0000000000E19000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/3980-400-0x0000000000980000-0x0000000000E19000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/4084-187-0x0000000000570000-0x0000000000A27000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4084-208-0x0000000000570000-0x0000000000A27000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4396-383-0x00000000007D0000-0x0000000000C87000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4396-381-0x00000000007D0000-0x0000000000C87000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4396-207-0x00000000007D0000-0x0000000000C87000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4396-440-0x00000000007D0000-0x0000000000C87000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4600-466-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4600-454-0x0000000000570000-0x0000000000A22000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4608-48-0x0000000000400000-0x0000000000463000-memory.dmp

                                      Filesize

                                      396KB

                                    • memory/4608-112-0x0000000000400000-0x0000000000463000-memory.dmp

                                      Filesize

                                      396KB

                                    • memory/4608-50-0x0000000000400000-0x0000000000463000-memory.dmp

                                      Filesize

                                      396KB

                                    • memory/4608-51-0x0000000000400000-0x0000000000463000-memory.dmp

                                      Filesize

                                      396KB

                                    • memory/4628-114-0x000000001C600000-0x000000001C612000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/4628-167-0x000000001F380000-0x000000001F542000-memory.dmp

                                      Filesize

                                      1.8MB

                                    • memory/4628-156-0x000000001C5E0000-0x000000001C5FE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/4628-148-0x000000001E830000-0x000000001E8A6000-memory.dmp

                                      Filesize

                                      472KB

                                    • memory/4628-168-0x000000001FA80000-0x000000001FFA8000-memory.dmp

                                      Filesize

                                      5.2MB

                                    • memory/4628-94-0x00000000009F0000-0x0000000000A8C000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/4752-471-0x0000000005110000-0x0000000005132000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/4752-472-0x0000000005930000-0x0000000005996000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/4752-507-0x0000000006580000-0x00000000065A2000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/4752-470-0x0000000005200000-0x0000000005828000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/4752-483-0x0000000005EB0000-0x0000000005ECE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/4752-505-0x0000000006FC0000-0x0000000007056000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/4752-469-0x0000000004A10000-0x0000000004A46000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/4752-506-0x0000000006530000-0x000000000654A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/4752-484-0x0000000006070000-0x00000000060BC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/4752-482-0x0000000005A10000-0x0000000005D64000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/5116-115-0x000000001DE20000-0x000000001DE5C000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/5116-113-0x000000001DEF0000-0x000000001DFFA000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/5116-95-0x0000000000A30000-0x0000000000A98000-memory.dmp

                                      Filesize

                                      416KB

                                    • memory/5440-2022-0x00000000074A0000-0x0000000007B1A000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/5440-2027-0x00000000071D0000-0x00000000071DE000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5440-2026-0x0000000007060000-0x0000000007071000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/5440-2023-0x0000000006ED0000-0x0000000006EDA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5440-2030-0x0000000007210000-0x0000000007218000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/5440-2028-0x00000000071E0000-0x00000000071F4000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/5440-2021-0x0000000006D70000-0x0000000006E13000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/5440-2020-0x0000000006080000-0x000000000609E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/5440-2029-0x0000000007220000-0x000000000723A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/5440-2009-0x0000000006D30000-0x0000000006D62000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/5440-2010-0x0000000071920000-0x000000007196C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/5440-2008-0x0000000006100000-0x000000000614C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/5440-1981-0x0000000005510000-0x0000000005864000-memory.dmp

                                      Filesize

                                      3.3MB