Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2024 14:45

General

  • Target

    67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe

  • Size

    1.8MB

  • MD5

    b0947367f4ee69a28851b851dc14422f

  • SHA1

    6b0d41bc9de6af9fb99259bbb9d8509137649a1f

  • SHA256

    67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50

  • SHA512

    781836587c5621f685deb701d1161b2ee8040bcd0dbdeba73989a931bb113869e8955f3d88df6d0f4fb4726b11c0da06ca2550b1d69a113091d7476d1dbf1e88

  • SSDEEP

    24576:/U7M/GPDDVXI7vrXqSLoeOBFpyAtIKf/UbsssCquw8uHf8f4SxKpOtll3Bx4H7:/UiGPDD9IrrXqSpxKUsC1ZuHAl0E/u

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

https://computeryrati.site/api

https://goalyfeastz.site/api

https://contemteny.site/api

https://dilemmadu.site/api

https://authorisev.site/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 14 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 59 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe
        "C:\Users\Admin\AppData\Local\Temp\67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2816
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            4⤵
              PID:1684
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              4⤵
                PID:2964
              • C:\Users\Admin\AppData\Local\Temp\1001698001\425b5d789b.exe
                "C:\Users\Admin\AppData\Local\Temp\1001698001\425b5d789b.exe"
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:1924
                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3024
                  • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2172
                  • C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1840
                  • C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe"
                    6⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2284
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat
                      7⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1568
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist
                        8⤵
                        • Enumerates processes with tasklist
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2000
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /I "wrsa opssvc"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:1184
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist
                        8⤵
                        • Enumerates processes with tasklist
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1560
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:1664
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c md 197036
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2312
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2116
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:1676
                      • C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pif
                        Jurisdiction.pif T
                        8⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:2444
                      • C:\Windows\SysWOW64\choice.exe
                        choice /d y /t 5
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:1516
                  • C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    PID:744
                  • C:\Users\Admin\AppData\Local\Temp\1000833001\29298a4dd2.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000833001\29298a4dd2.exe"
                    6⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1624
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      PID:1536
                  • C:\Users\Admin\AppData\Local\Temp\1000857001\0866725587.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000857001\0866725587.exe"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1556
                  • C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:3004
                    • C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe"
                      7⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Modifies system certificate store
                      PID:2624
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 52
                      7⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2244
                  • C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2232
                  • C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1716
                    • C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe
                      "C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe"
                      7⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:1724
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 52
                      7⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:872
                  • C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe"
                    6⤵
                    • Executes dropped EXE
                    • Accesses Microsoft Outlook profiles
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • outlook_office_path
                    • outlook_win_path
                    PID:2560
                    • C:\Windows\system32\cmd.exe
                      "cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
                      7⤵
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:2160
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        8⤵
                          PID:2116
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show profiles
                          8⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Network Configuration Discovery: Wi-Fi Discovery
                          PID:740
                        • C:\Windows\system32\findstr.exe
                          findstr /R /C:"[ ]:[ ]"
                          8⤵
                            PID:2156
                        • C:\Windows\system32\cmd.exe
                          "cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
                          7⤵
                            PID:2272
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              8⤵
                                PID:1768
                              • C:\Windows\system32\netsh.exe
                                netsh wlan show networks mode=bssid
                                8⤵
                                • Event Triggered Execution: Netsh Helper DLL
                                PID:896
                              • C:\Windows\system32\findstr.exe
                                findstr "SSID BSSID Signal"
                                8⤵
                                  PID:1476
                            • C:\Users\Admin\AppData\Local\Temp\1001523001\6eb604ff16.exe
                              "C:\Users\Admin\AppData\Local\Temp\1001523001\6eb604ff16.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2744
                            • C:\Users\Admin\AppData\Local\Temp\1001524001\8bffec3ec8.exe
                              "C:\Users\Admin\AppData\Local\Temp\1001524001\8bffec3ec8.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2716
                        • C:\Users\Admin\AppData\Local\Temp\1001735001\4f7cffe218.exe
                          "C:\Users\Admin\AppData\Local\Temp\1001735001\4f7cffe218.exe"
                          4⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3044
                        • C:\Users\Admin\AppData\Local\Temp\1001776101\f24c652b6e.exe
                          "C:\Users\Admin\AppData\Local\Temp\1001776101\f24c652b6e.exe"
                          4⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • System Location Discovery: System Language Discovery
                          PID:300
                        • C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe
                          "C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:2608
                          • C:\Users\Admin\AppData\Local\Temp\is-ITUGU.tmp\FontCreator.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-ITUGU.tmp\FontCreator.tmp" /SL5="$801CA,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe"
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:1512
                            • C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe
                              "C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe" /VERYSILENT
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:2800
                              • C:\Users\Admin\AppData\Local\Temp\is-52QU9.tmp\FontCreator.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-52QU9.tmp\FontCreator.tmp" /SL5="$901CA,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe" /VERYSILENT
                                7⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                PID:1248
                                • C:\Windows\system32\cmd.exe
                                  "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
                                  8⤵
                                    PID:2712
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
                                      9⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1420
                                    • C:\Windows\system32\find.exe
                                      find /I "wrsa.exe"
                                      9⤵
                                        PID:1480
                                    • C:\Windows\system32\cmd.exe
                                      "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
                                      8⤵
                                        PID:3032
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
                                          9⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1912
                                        • C:\Windows\system32\find.exe
                                          find /I "opssvc.exe"
                                          9⤵
                                            PID:944
                                        • C:\Windows\system32\cmd.exe
                                          "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
                                          8⤵
                                            PID:996
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
                                              9⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2012
                                            • C:\Windows\system32\find.exe
                                              find /I "avastui.exe"
                                              9⤵
                                                PID:2592
                                            • C:\Windows\system32\cmd.exe
                                              "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
                                              8⤵
                                                PID:1548
                                                • C:\Windows\system32\tasklist.exe
                                                  tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
                                                  9⤵
                                                  • Enumerates processes with tasklist
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2036
                                                • C:\Windows\system32\find.exe
                                                  find /I "avgui.exe"
                                                  9⤵
                                                    PID:1256
                                                • C:\Windows\system32\cmd.exe
                                                  "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
                                                  8⤵
                                                    PID:824
                                                    • C:\Windows\system32\tasklist.exe
                                                      tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
                                                      9⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:880
                                                    • C:\Windows\system32\find.exe
                                                      find /I "nswscsvc.exe"
                                                      9⤵
                                                        PID:1276
                                                    • C:\Windows\system32\cmd.exe
                                                      "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
                                                      8⤵
                                                        PID:2740
                                                        • C:\Windows\system32\tasklist.exe
                                                          tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
                                                          9⤵
                                                          • Enumerates processes with tasklist
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2384
                                                        • C:\Windows\system32\find.exe
                                                          find /I "sophoshealth.exe"
                                                          9⤵
                                                            PID:2160
                                                        • C:\Users\Admin\AppData\Local\hangbird\Updater.exe
                                                          "C:\Users\Admin\AppData\Local\hangbird\\Updater.exe" "C:\Users\Admin\AppData\Local\hangbird\\caliculus.csv"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2340
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\IyASmY.a3x && del C:\ProgramData\\IyASmY.a3x
                                                            9⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            PID:3496
                                                            • C:\Windows\SysWOW64\PING.EXE
                                                              ping -n 5 127.0.0.1
                                                              10⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:1712
                                                            • C:\Users\Admin\AppData\Local\hangbird\Updater.exe
                                                              updater.exe C:\ProgramData\\IyASmY.a3x
                                                              10⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              • Checks processor information in registry
                                                              PID:2192
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                11⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3272
                                                • C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2560
                                                  • C:\Users\Admin\AppData\Local\Temp\is-RNMT7.tmp\FontCreator.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-RNMT7.tmp\FontCreator.tmp" /SL5="$7015C,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2072
                                                    • C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe" /VERYSILENT
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1220
                                                      • C:\Users\Admin\AppData\Local\Temp\is-RNDC5.tmp\FontCreator.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-RNDC5.tmp\FontCreator.tmp" /SL5="$8015C,2820349,845824,C:\Users\Admin\AppData\Local\Temp\1003143001\FontCreator.exe" /VERYSILENT
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of FindShellTrayWindow
                                                        PID:1936
                                                        • C:\Windows\system32\cmd.exe
                                                          "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
                                                          8⤵
                                                            PID:1968
                                                            • C:\Windows\system32\tasklist.exe
                                                              tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
                                                              9⤵
                                                              • Enumerates processes with tasklist
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1416
                                                            • C:\Windows\system32\find.exe
                                                              find /I "wrsa.exe"
                                                              9⤵
                                                                PID:1928
                                                            • C:\Windows\system32\cmd.exe
                                                              "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
                                                              8⤵
                                                                PID:1456
                                                                • C:\Windows\system32\tasklist.exe
                                                                  tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
                                                                  9⤵
                                                                  • Enumerates processes with tasklist
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2544
                                                                • C:\Windows\system32\find.exe
                                                                  find /I "opssvc.exe"
                                                                  9⤵
                                                                    PID:888
                                                                • C:\Windows\system32\cmd.exe
                                                                  "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
                                                                  8⤵
                                                                    PID:1912
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
                                                                      9⤵
                                                                      • Enumerates processes with tasklist
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:984
                                                                    • C:\Windows\system32\find.exe
                                                                      find /I "avastui.exe"
                                                                      9⤵
                                                                        PID:2660
                                                                    • C:\Windows\system32\cmd.exe
                                                                      "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
                                                                      8⤵
                                                                        PID:1700
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
                                                                          9⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2284
                                                                        • C:\Windows\system32\find.exe
                                                                          find /I "avgui.exe"
                                                                          9⤵
                                                                            PID:308
                                                                        • C:\Windows\system32\cmd.exe
                                                                          "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
                                                                          8⤵
                                                                            PID:1764
                                                                            • C:\Windows\system32\tasklist.exe
                                                                              tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
                                                                              9⤵
                                                                              • Enumerates processes with tasklist
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:884
                                                                            • C:\Windows\system32\find.exe
                                                                              find /I "nswscsvc.exe"
                                                                              9⤵
                                                                                PID:1576
                                                                            • C:\Windows\system32\cmd.exe
                                                                              "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
                                                                              8⤵
                                                                                PID:2132
                                                                                • C:\Windows\system32\tasklist.exe
                                                                                  tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
                                                                                  9⤵
                                                                                  • Enumerates processes with tasklist
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1720
                                                                                • C:\Windows\system32\find.exe
                                                                                  find /I "sophoshealth.exe"
                                                                                  9⤵
                                                                                    PID:2792
                                                                                • C:\Users\Admin\AppData\Local\hangbird\Updater.exe
                                                                                  "C:\Users\Admin\AppData\Local\hangbird\\Updater.exe" "C:\Users\Admin\AppData\Local\hangbird\\caliculus.csv"
                                                                                  8⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1520
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\D52MRkJ4c.a3x && del C:\ProgramData\\D52MRkJ4c.a3x
                                                                                    9⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    PID:4044
                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                      ping -n 5 127.0.0.1
                                                                                      10⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:3976
                                                                                    • C:\Users\Admin\AppData\Local\hangbird\Updater.exe
                                                                                      updater.exe C:\ProgramData\\D52MRkJ4c.a3x
                                                                                      10⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Checks processor information in registry
                                                                                      PID:868
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        11⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2232
                                                                        • C:\Users\Admin\AppData\Local\Temp\1003176001\giganticurtain.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1003176001\giganticurtain.exe"
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          PID:2804
                                                                        • C:\Users\Admin\AppData\Local\Temp\1003189001\1d395b0ffd.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1003189001\1d395b0ffd.exe"
                                                                          4⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1604
                                                                        • C:\Users\Admin\AppData\Local\Temp\1003190001\3157632031.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1003190001\3157632031.exe"
                                                                          4⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1764
                                                                        • C:\Users\Admin\AppData\Local\Temp\1003191001\3dc5944b63.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1003191001\3dc5944b63.exe"
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3340
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM firefox.exe /T
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3356
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM chrome.exe /T
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3472
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM msedge.exe /T
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3520
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM opera.exe /T
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3564
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM brave.exe /T
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3612
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                            5⤵
                                                                              PID:3656
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                6⤵
                                                                                • Checks processor information in registry
                                                                                • Modifies registry class
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:3664
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.0.499872875\422590818" -parentBuildID 20221007134813 -prefsHandle 1176 -prefMapHandle 1168 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {360e88d9-7d9c-4800-8c59-28cd1aa666d4} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 1244 106edb58 gpu
                                                                                  7⤵
                                                                                    PID:3816
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.1.1830315089\1019228193" -parentBuildID 20221007134813 -prefsHandle 1460 -prefMapHandle 1456 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {754d59fb-2a2e-418b-b348-cdfcf4b965fa} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 1472 7ae3d58 socket
                                                                                    7⤵
                                                                                      PID:3892
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.2.1179795083\1041535945" -childID 1 -isForBrowser -prefsHandle 2272 -prefMapHandle 2268 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55a91774-9f25-4a68-8006-1d3fef8f6f8e} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 2344 1728f658 tab
                                                                                      7⤵
                                                                                        PID:2328
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.3.289896718\371746994" -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 2764 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08e9d022-a26d-40f2-a714-6defecf13e93} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 2780 d2f958 tab
                                                                                        7⤵
                                                                                          PID:3188
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.4.1731287902\1451892659" -childID 3 -isForBrowser -prefsHandle 3524 -prefMapHandle 3528 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bcf146d-c87f-415d-a153-154ac96bac6b} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 3600 1f198958 tab
                                                                                          7⤵
                                                                                            PID:1676
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.5.1709650108\2039699701" -childID 4 -isForBrowser -prefsHandle 3740 -prefMapHandle 3744 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4087e35-020b-47db-8ba5-337bb4b01634} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 3836 1faa4258 tab
                                                                                            7⤵
                                                                                              PID:1632
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3664.6.1359097681\649732659" -childID 5 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da46e10c-799c-454f-9e9e-20c28057d926} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" 3940 1faa2158 tab
                                                                                              7⤵
                                                                                                PID:2676
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1003192001\num.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\1003192001\num.exe"
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2272
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
                                                                                      2⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2796
                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                        schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
                                                                                        3⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:2544
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit
                                                                                      2⤵
                                                                                      • Drops startup file
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2808

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\ProgramData\IyASmY.a3x

                                                                                    Filesize

                                                                                    498KB

                                                                                    MD5

                                                                                    bd2302f160b9895dd7bcf9c7dfa9bea7

                                                                                    SHA1

                                                                                    8fcb264280a30cc5f959d54ae75ae394054ca5a0

                                                                                    SHA256

                                                                                    3eaff063360a89395b52681248a64aa2a8acca6da13eaa0194db004fa2a612c0

                                                                                    SHA512

                                                                                    2847c9e4233a5f5a662027d46ee04eb4d79ad937fbdddc54b16e72547e34414094ff56bc08016fcf31ba5769cfca2d7849ad3edea438c57b34402f1e105852e6

                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                                                                                    Filesize

                                                                                    23KB

                                                                                    MD5

                                                                                    660a23874629434c1c7d25a74bf32168

                                                                                    SHA1

                                                                                    4706b2a5ded62a129df231b519da4893e45c4f70

                                                                                    SHA256

                                                                                    24beb4fcfa253041be06d10a546960021da775e846bd97c6997db26f14026347

                                                                                    SHA512

                                                                                    00d6ddc1a597f97fcf859931092e450611341b4b7cbfe863c6dbbfa609e2d478e141c9959cb05f8943b16517d48aa99a7b6dd44d195bc5d1a84cdeb37d116587

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                    Filesize

                                                                                    307KB

                                                                                    MD5

                                                                                    68a99cf42959dc6406af26e91d39f523

                                                                                    SHA1

                                                                                    f11db933a83400136dc992820f485e0b73f1b933

                                                                                    SHA256

                                                                                    c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                                                    SHA512

                                                                                    7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000477001\Offnewhere.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    87e4e869971cec9573811040f6140157

                                                                                    SHA1

                                                                                    6308d9e243317a829d602c6a2f667fff6d05d148

                                                                                    SHA256

                                                                                    0ad7e833d526131900916008913dec998360ee6d1a9aacf3997602e1cfc1c3e3

                                                                                    SHA512

                                                                                    71f1040d823deb28361966e41f0cba63d735425edc83c9d790b1bffc2abe97eb5fe2642358b0aa3b9a505230d87049c0d36f84e58499575d2d5983926df0e881

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000817001\splwow64.exe

                                                                                    Filesize

                                                                                    1.2MB

                                                                                    MD5

                                                                                    5d97c2475c8a4d52e140ef4650d1028b

                                                                                    SHA1

                                                                                    da20d0a43d6f8db44ff8212875a7e0f7bb223223

                                                                                    SHA256

                                                                                    f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf

                                                                                    SHA512

                                                                                    22c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000828001\new_v8.exe

                                                                                    Filesize

                                                                                    5.7MB

                                                                                    MD5

                                                                                    5009b1ef6619eca039925510d4fd51a1

                                                                                    SHA1

                                                                                    22626aa57e21291a995615f9f6bba083d8706764

                                                                                    SHA256

                                                                                    fbc8c32bf799a005c57540a2e85dd3662ed5795a55f11495f0ba569bbb09df59

                                                                                    SHA512

                                                                                    2b5bbd9449be00588058966db487c0adfac764827a6691f6a9fc6c3a770a93bda11c732d2eb2a3c660697cbc69b1c71a2bf76d2957f65cd2599fb28098b24f14

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000833001\29298a4dd2.exe

                                                                                    Filesize

                                                                                    514KB

                                                                                    MD5

                                                                                    26d8d52bac8f4615861f39e118efa28d

                                                                                    SHA1

                                                                                    efd5a7ccd128ffe280af75ec8b3e465c989d9e35

                                                                                    SHA256

                                                                                    8521a1f4d523a2a9e7f8ddf01147e65e7f3ff54b268e9b40f91e07dc01fa148f

                                                                                    SHA512

                                                                                    1911a21d654e317fba50308007bb9d56fba2c19a545ef6dfaade17821b0f8fc48aa041c8a4a0339bee61cbd429852d561985e27c574eced716b2e937afa18733

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000857001\0866725587.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    c3d2258f659a0eda9dbd5f5497119331

                                                                                    SHA1

                                                                                    26870ac488181281690883dc7494fdfc64c9bc77

                                                                                    SHA256

                                                                                    e0e29a0f0a42cbee836f0e430a98dadae6937d5983971162bdccffe794a67702

                                                                                    SHA512

                                                                                    401e1a870935429f8cf9c4ed18d996ec7f73fdf9034e02069be249fc9bd35db0ca7a7ae1e03f8ea23a25715230b82c0055efc2032ea2dd1e8d6afcdeb7c986d8

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000965001\GOLD1234.exe

                                                                                    Filesize

                                                                                    645KB

                                                                                    MD5

                                                                                    bdf3c509a0751d1697ba1b1b294fd579

                                                                                    SHA1

                                                                                    3a3457e5a8b41ed6f42b3197cff53c8ec50b4db2

                                                                                    SHA256

                                                                                    d3948ae31c42fcba5d9199e758d145ff74dad978c80179afb3148604c254be6d

                                                                                    SHA512

                                                                                    aa81ccbae9f622531003f1737d22872ae909b28359dfb94813a39d74bde757141d7543681793102a1dc3dcaecea27cffd0363de8bbb48434fcf8b6dafef320b3

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001096001\RDX123456.exe

                                                                                    Filesize

                                                                                    327KB

                                                                                    MD5

                                                                                    fba8f56206955304b2a6207d9f5e8032

                                                                                    SHA1

                                                                                    f84cbcc3e34f4d2c8fea97c2562f937e1e20fe28

                                                                                    SHA256

                                                                                    11227ead147b4154c7bd21b75d7f130b498c9ad9b520ca1814c5d6a688c89b1b

                                                                                    SHA512

                                                                                    56e3a0823a7abe08e1c9918d8fa32c574208b462b423ab6bde03345c654b75785fdc3180580c0d55280644b3a9574983e925f2125c2d340cf5e96b98237e99fa

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001172001\Set-up.exe

                                                                                    Filesize

                                                                                    36B

                                                                                    MD5

                                                                                    a1ca4bebcd03fafbe2b06a46a694e29a

                                                                                    SHA1

                                                                                    ffc88125007c23ff6711147a12f9bba9c3d197ed

                                                                                    SHA256

                                                                                    c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65

                                                                                    SHA512

                                                                                    6fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001425001\shop.exe

                                                                                    Filesize

                                                                                    649KB

                                                                                    MD5

                                                                                    e3d038ee8743eeb4759105852f8c9973

                                                                                    SHA1

                                                                                    c029f68a065ecbaf124f2d8569fc3d097cff8da9

                                                                                    SHA256

                                                                                    250784e06ac98ad9183950ef5ec3549c2a5e2ffb0306f167ae84c4cb55b12922

                                                                                    SHA512

                                                                                    f45ba1d08582ad5daf8b09faa52807169542b29054204da2e346f9dbd84d93041452503ec87617979b326a3d9e00efe18fe7cc6baa377c6e99327161bb886445

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001510001\v7wa24td.exe

                                                                                    Filesize

                                                                                    772KB

                                                                                    MD5

                                                                                    6782ce61039f27f01fb614d3069c7cd0

                                                                                    SHA1

                                                                                    6870c4d274654f7a6d0971579b50dd9dedaa18ad

                                                                                    SHA256

                                                                                    11798c5a66618d32e2666009fb1f4569ae8b2744fa0278f915f5c1eefb1fd98d

                                                                                    SHA512

                                                                                    90fc316784eba2e553c2658ac348e6fcb4ab6987209d51e83c1d39d7a784ca0f18729349904bac6d92d3b163ce9f0270369a38eac8c9541ae211d74bce794938

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001523001\6eb604ff16.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    f2fde55b62096ed86a482be7a857d88f

                                                                                    SHA1

                                                                                    79b18ae386502bd64513a726a9eb550bf35da901

                                                                                    SHA256

                                                                                    282024971a72245b40a88f0f1a48d42db5d0dddb9d8885a29c7b3c4f819bb823

                                                                                    SHA512

                                                                                    65f74b8baf93a4bae7475e6b442caace4b61b4a2906ada286ce08290e33c5310f9233d69782af4530e86192bb7290ed9653900cb024bfe2ed47da1509de10c63

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001698001\425b5d789b.exe

                                                                                    Filesize

                                                                                    1.8MB

                                                                                    MD5

                                                                                    1203696d83758b3438ef94136fa2322d

                                                                                    SHA1

                                                                                    78bc38b6f5fbf128fc379d5a8d9d39a5ad1071b0

                                                                                    SHA256

                                                                                    4d49c464b47c67b27603332e141c74c176326c01f7ccadeef23fc70ac7285826

                                                                                    SHA512

                                                                                    4ad942d9c38375cf138d137e1e44ca1136683513b84280979c81b80961ce548d117f5f2dbee4d666fee664076b44bacdd367069f6118f6c5e8118aa1c32684af

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1001735001\4f7cffe218.exe

                                                                                    Filesize

                                                                                    2.6MB

                                                                                    MD5

                                                                                    8017057cedbae4c7edf80746781c94f6

                                                                                    SHA1

                                                                                    43a576a4871c8c35c36d88323121c00f2335e8f3

                                                                                    SHA256

                                                                                    9ab2049e0c7c20b13da32338d5876c18f0d16d70b4ec29d27dc4804e2b8ed103

                                                                                    SHA512

                                                                                    180612f6999db2452d80941ec4b55c98fb3411d1b8eccce64ac00512efb32b7e4fb347644c2b29bd10635ad08f197bd6ccf34fb317d7adb39d8a125632bd5502

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1003142001\FontCreator.exe

                                                                                    Filesize

                                                                                    5.9MB

                                                                                    MD5

                                                                                    6fdf2cdf68ab1880aa76e7938e241fa3

                                                                                    SHA1

                                                                                    affc9a0aea771ad101357cc728951f5938b5e4e6

                                                                                    SHA256

                                                                                    e61ce90df13402909985f5312fdef798736eb10e0b5b6b280fb826538e7a597a

                                                                                    SHA512

                                                                                    7e649db70d39a135cd86a837308fb304f16c904456ca3b97a70b8f8b1fd617291de8974aab3808ac67e5d2f7e9efa3840bbdeba1e3558de33587c7ff94ce231d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1003176001\giganticurtain.exe

                                                                                    Filesize

                                                                                    2.7MB

                                                                                    MD5

                                                                                    002423f02fdc16eb81ea32ee8fa26539

                                                                                    SHA1

                                                                                    8d903daf29dca4b3adfb77e2cee357904e404987

                                                                                    SHA256

                                                                                    7c8094149aa2ce7213c423e2577785feeee8b7ca07d88a4d4bf3806d1d122ea2

                                                                                    SHA512

                                                                                    c45bdd276ed5b504ae27ab0977110cbe30290623deccf8a40bcddf0c3a9082ace240f060483b89534fc4f686edd3ce3d4de3894201cceaaba9d66b52685938f9

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1003189001\1d395b0ffd.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    c0d39d5e38b55cde6047311bee378a32

                                                                                    SHA1

                                                                                    f3a4482abc089359f68004170a17359e8342ae7d

                                                                                    SHA256

                                                                                    5d3a5d1516589d0d8fd04519d690dcc6d0d1567e5cdb473745261af0df5fdc97

                                                                                    SHA512

                                                                                    a25c628691b05b97757a1f1fbc6a92e1d8fecbc70830bc367c1e11f9134493752c96244fa43bd75f65b86efb2ea216a3ca37759804f606fb6fd7989141203f02

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1003191001\3dc5944b63.exe

                                                                                    Filesize

                                                                                    898KB

                                                                                    MD5

                                                                                    8346173ae03c022fbed2fd1658fe57cf

                                                                                    SHA1

                                                                                    73f05f5f87026f5b383cf5c29c4b886a9e708a55

                                                                                    SHA256

                                                                                    d6b1f7fc959c530d6fac50ae25944d8b7458005241c23f8444b4670bc6e41090

                                                                                    SHA512

                                                                                    9fe533a8409e478f85514c24f98823892d56568c9294a6a71cd6c0a263b3f4bbc7ac3d8098b0508873540b1008d6960671f5512889c1fcfa260a1450f21ecf3f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1003192001\num.exe

                                                                                    Filesize

                                                                                    868KB

                                                                                    MD5

                                                                                    f793d9e588c6bf51f1daf523ab2df1ce

                                                                                    SHA1

                                                                                    f63ce1f9eee9f3ae643e270c7fc854dc51d730d0

                                                                                    SHA256

                                                                                    a8addc675fcc27c94ff9e4775bb2e090f4da1287aae6b95cecc65ccf533bc61d

                                                                                    SHA512

                                                                                    4d0d8bf366f4b4793154f31aee4983df307b97edc83608b76628168418d48227eb46f6213469eb4d3a088d891a143b30b3b02acbb194df834da1b61d182607eb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\163522206146

                                                                                    Filesize

                                                                                    87KB

                                                                                    MD5

                                                                                    93397046ed0716144ed24cd03f7bbcc3

                                                                                    SHA1

                                                                                    daebc5faaa5b993c4be3695a46ac13631efd1cb2

                                                                                    SHA256

                                                                                    f67d080c32c6b2db113a20a1ee24e4a398b9d82aa899158ca9c30353199e513e

                                                                                    SHA512

                                                                                    52d34cd9b4946fd6a600e0f99d63ed97fc4d982c44e769f40a7550e6a2209308726c28515f8af2aedb8343b1aad6ba845059780b25108f1c5f156e4c3364e2d9

                                                                                  • C:\Users\Admin\AppData\Local\Temp\197036\T

                                                                                    Filesize

                                                                                    580KB

                                                                                    MD5

                                                                                    4b0812fabc1ba34d8d45d28180f6c75f

                                                                                    SHA1

                                                                                    b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950

                                                                                    SHA256

                                                                                    73312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103

                                                                                    SHA512

                                                                                    7f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Beijing

                                                                                    Filesize

                                                                                    24KB

                                                                                    MD5

                                                                                    2a84a77ad125a30e442d57c63c18e00e

                                                                                    SHA1

                                                                                    68567ee0d279087a12374c10a8b7981f401b20b8

                                                                                    SHA256

                                                                                    0c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769

                                                                                    SHA512

                                                                                    9d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Cab879.tmp

                                                                                    Filesize

                                                                                    70KB

                                                                                    MD5

                                                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                    SHA1

                                                                                    1723be06719828dda65ad804298d0431f6aff976

                                                                                    SHA256

                                                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                    SHA512

                                                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Fitting

                                                                                    Filesize

                                                                                    62KB

                                                                                    MD5

                                                                                    46a51002cdbe912d860ce08c83c0376b

                                                                                    SHA1

                                                                                    6d0ae63850bd8d5c86e45cba938609a7f051f59b

                                                                                    SHA256

                                                                                    18070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017

                                                                                    SHA512

                                                                                    ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Molecular

                                                                                    Filesize

                                                                                    69KB

                                                                                    MD5

                                                                                    8ca4bbb4e4ddf045ff547cb2d438615c

                                                                                    SHA1

                                                                                    3e2fc0fdc0359a08c7782f44a5ccebf3a52b5152

                                                                                    SHA256

                                                                                    4e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed

                                                                                    SHA512

                                                                                    b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Mtv

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    f3d7abb7a7c91203886dd0f2df4fc0d6

                                                                                    SHA1

                                                                                    60ffbb095fceeb2ea2b9e65355e9dbf1de736d6c

                                                                                    SHA256

                                                                                    5867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3

                                                                                    SHA512

                                                                                    9af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367

                                                                                  • C:\Users\Admin\AppData\Local\Temp\See

                                                                                    Filesize

                                                                                    58KB

                                                                                    MD5

                                                                                    84c831b7996dfc78c7e4902ad97e8179

                                                                                    SHA1

                                                                                    739c580a19561b6cde4432a002a502bea9f32754

                                                                                    SHA256

                                                                                    1ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575

                                                                                    SHA512

                                                                                    ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Spirit

                                                                                    Filesize

                                                                                    80KB

                                                                                    MD5

                                                                                    0814e2558c8e63169d393fac20c668f9

                                                                                    SHA1

                                                                                    52e8b77554cc098410408668e3d4f127fa02d8bd

                                                                                    SHA256

                                                                                    cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d

                                                                                    SHA512

                                                                                    80e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Sponsorship

                                                                                    Filesize

                                                                                    71KB

                                                                                    MD5

                                                                                    6785e2e985143a33c5c3557788f12a2b

                                                                                    SHA1

                                                                                    7a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0

                                                                                    SHA256

                                                                                    66bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7

                                                                                    SHA512

                                                                                    3edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Sweet

                                                                                    Filesize

                                                                                    865KB

                                                                                    MD5

                                                                                    6cee6bd1b0b8230a1c792a0e8f72f7eb

                                                                                    SHA1

                                                                                    66a7d26ed56924f31e681c1af47d6978d1d6e4e8

                                                                                    SHA256

                                                                                    08ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab

                                                                                    SHA512

                                                                                    4d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193

                                                                                  • C:\Users\Admin\AppData\Local\Temp\TarD2D.tmp

                                                                                    Filesize

                                                                                    181KB

                                                                                    MD5

                                                                                    4ea6026cf93ec6338144661bf1202cd1

                                                                                    SHA1

                                                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                    SHA256

                                                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                    SHA512

                                                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Twisted

                                                                                    Filesize

                                                                                    95KB

                                                                                    MD5

                                                                                    ba8c4239470d59c50a35a25b7950187f

                                                                                    SHA1

                                                                                    855a8f85182dd03f79787147b73ae5ed61fb8d7b

                                                                                    SHA256

                                                                                    a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b

                                                                                    SHA512

                                                                                    1e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Various

                                                                                    Filesize

                                                                                    92KB

                                                                                    MD5

                                                                                    2759c67bccd900a1689d627f38f0a635

                                                                                    SHA1

                                                                                    d71b170715ed2b304167545af2bd42834ccf1881

                                                                                    SHA256

                                                                                    510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05

                                                                                    SHA512

                                                                                    aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Witch

                                                                                    Filesize

                                                                                    53KB

                                                                                    MD5

                                                                                    79156afddd310be36f037a8f0708a794

                                                                                    SHA1

                                                                                    09ef36ae22b5eab65d1f62166542601b8919399d

                                                                                    SHA256

                                                                                    7faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503

                                                                                    SHA512

                                                                                    d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                    Filesize

                                                                                    442KB

                                                                                    MD5

                                                                                    85430baed3398695717b0263807cf97c

                                                                                    SHA1

                                                                                    fffbee923cea216f50fce5d54219a188a5100f41

                                                                                    SHA256

                                                                                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                                    SHA512

                                                                                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                    Filesize

                                                                                    8.0MB

                                                                                    MD5

                                                                                    a01c5ecd6108350ae23d2cddf0e77c17

                                                                                    SHA1

                                                                                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                                    SHA256

                                                                                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                                    SHA512

                                                                                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    b2a0fdbc8547f1859ed05fe8c46f7cfb

                                                                                    SHA1

                                                                                    a84f2ce1514e74fcfd567ed73a998a29f3218c61

                                                                                    SHA256

                                                                                    6e3b09de28110b0dbe20e101b651ee5a1fd85fba4609a6c31a9dddd8a62cbf7d

                                                                                    SHA512

                                                                                    4ec472fdae32c8239f07028fb4cee078e5a52efc3cfcc2622458646effa8e7afdfbc34a1d61f9db6c6574ae9ccfd7a2aa214fa51f1529380848702d96a508412

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\0035ca70-2af2-4373-a404-dc9c2d99a143

                                                                                    Filesize

                                                                                    12KB

                                                                                    MD5

                                                                                    d681ddd5074e7947307e7cfbffaaef1e

                                                                                    SHA1

                                                                                    5ed9904b7f023b5770fe464cacc55fd0175f5e26

                                                                                    SHA256

                                                                                    b46e72d58673e9237ac75d87cb776b6fcecde94c38d69184f249fa2130b73122

                                                                                    SHA512

                                                                                    d345c14c4c0a461e7c6d69d9ab8fb12948abe6db060478739fa2af67abddf61db2b9a4e759cb94329e98697368e224caabe0040d37e54f8cdbdc524e9b20622d

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\cbdac662-7ddc-4883-8950-ea44df059a2e

                                                                                    Filesize

                                                                                    745B

                                                                                    MD5

                                                                                    b2dfbca197bed37a9fe2f4d529805c28

                                                                                    SHA1

                                                                                    cb62b40e723aa149173697d782b8f899bd5ff232

                                                                                    SHA256

                                                                                    482184eac3f34f93f3a02ee4da5d8c5d772d2b83232a76bdfc600627b234f542

                                                                                    SHA512

                                                                                    e4a8447279ec788aedc669d31f51e018d380122e3f2f199041df356a6aae7a116ff4ae6370f2799daaaa5b13b72b2f18a3f43c887ed7793403e8bf8c97eecad5

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                                    Filesize

                                                                                    997KB

                                                                                    MD5

                                                                                    fe3355639648c417e8307c6d051e3e37

                                                                                    SHA1

                                                                                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                                    SHA256

                                                                                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                                    SHA512

                                                                                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                                    Filesize

                                                                                    116B

                                                                                    MD5

                                                                                    3d33cdc0b3d281e67dd52e14435dd04f

                                                                                    SHA1

                                                                                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                                    SHA256

                                                                                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                                    SHA512

                                                                                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                                    Filesize

                                                                                    479B

                                                                                    MD5

                                                                                    49ddb419d96dceb9069018535fb2e2fc

                                                                                    SHA1

                                                                                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                    SHA256

                                                                                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                    SHA512

                                                                                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                                    Filesize

                                                                                    372B

                                                                                    MD5

                                                                                    8be33af717bb1b67fbd61c3f4b807e9e

                                                                                    SHA1

                                                                                    7cf17656d174d951957ff36810e874a134dd49e0

                                                                                    SHA256

                                                                                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                                    SHA512

                                                                                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                                    Filesize

                                                                                    11.8MB

                                                                                    MD5

                                                                                    33bf7b0439480effb9fb212efce87b13

                                                                                    SHA1

                                                                                    cee50f2745edc6dc291887b6075ca64d716f495a

                                                                                    SHA256

                                                                                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                                                    SHA512

                                                                                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    688bed3676d2104e7f17ae1cd2c59404

                                                                                    SHA1

                                                                                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                    SHA256

                                                                                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                    SHA512

                                                                                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    937326fead5fd401f6cca9118bd9ade9

                                                                                    SHA1

                                                                                    4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                                    SHA256

                                                                                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                                    SHA512

                                                                                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    f42b9de861737f4379ffdfd117527abb

                                                                                    SHA1

                                                                                    eacc69ac2f2379a8885f38927640ca91066514f7

                                                                                    SHA256

                                                                                    672003034499aba4d911badf2dc79397182b8403a7b2a6ed9249f709c4b4bfda

                                                                                    SHA512

                                                                                    f4fcc436db5d338528dcb9fc52aa0c6ff4551101b0b7807e84086868671cceae40d64fcc4197b61ee65e7ba5aa48350bfde89f248689bd321ac00ca83fa1be08

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    5026fe2d1cb19d6146c8026283b9163e

                                                                                    SHA1

                                                                                    3662689666f61a4c6dd7c4cc607ceaa1c864a7e3

                                                                                    SHA256

                                                                                    2f10ad30fdd7505272a36b532aa2f5244cf9e94a6016ee61277e07e6c42a4fb4

                                                                                    SHA512

                                                                                    6d320947f279862ce5ad2461601d59282452df6fe454e42dbfc27dd3e71b3ac0cb7a476d3ef9ae0baf0c9819f5ad96635546565684bbeaacb4b1fb607c1ca993

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    8993254ced3cee17ec9b5c1329fd9bb4

                                                                                    SHA1

                                                                                    c418fa64d671fdbaf0c1bd438afcc8846db54261

                                                                                    SHA256

                                                                                    bc5279e9a75fe5464293dea48747ecb1e3d94763216dbc718cb1e1a361b3fb5d

                                                                                    SHA512

                                                                                    378be0191d33ef5058a06f523b68ff7cd706598aa95814015f47efbc88749dd419ca3a0203a95af7834c010e42a55b53bd2bd7aaa6e2e6e00dbab3b59d44c973

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    b1a9d1c8107215728e3c79dfb29ebce2

                                                                                    SHA1

                                                                                    f0d0a3453b19fb797bed4e44732665f1c9205394

                                                                                    SHA256

                                                                                    b3d9fd33928a574d2256a2c62b3c62077296d9278765a6515ed5a7dbfc580eeb

                                                                                    SHA512

                                                                                    7f3bbb041be76e2a3df1ac25637c79bc6666b089837258b2aa9665c824720f40571fc9ab009c032f587443fcafc2752bc204b36874b06bd37356c3c7627f9381

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                    Filesize

                                                                                    4KB

                                                                                    MD5

                                                                                    9c870deac09b1bb436f7860cdee6c666

                                                                                    SHA1

                                                                                    da8012fb3f33b9d3968b3d926c12edcb7cbdd5dd

                                                                                    SHA256

                                                                                    e3fd2bfc4fcf3e5670c044349aad10d92a08568711a6233b02c462ba0772828f

                                                                                    SHA512

                                                                                    854c986db6d90fe34b3b3c3e9dc6160118fded7ba8b2e049133ad49cfcf89e78eae8a32766a0fdfcf712aa1e658e5a835e3ef4fa47b9287d11cc47eb95cf45ae

                                                                                  • \ProgramData\mozglue.dll

                                                                                    Filesize

                                                                                    593KB

                                                                                    MD5

                                                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                                                    SHA1

                                                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                    SHA256

                                                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                    SHA512

                                                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                  • \ProgramData\nss3.dll

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                                                    SHA1

                                                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                    SHA256

                                                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                    SHA512

                                                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                  • \Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pif

                                                                                    Filesize

                                                                                    872KB

                                                                                    MD5

                                                                                    18ce19b57f43ce0a5af149c96aecc685

                                                                                    SHA1

                                                                                    1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                    SHA256

                                                                                    d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                    SHA512

                                                                                    a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                  • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                    Filesize

                                                                                    1.8MB

                                                                                    MD5

                                                                                    b0947367f4ee69a28851b851dc14422f

                                                                                    SHA1

                                                                                    6b0d41bc9de6af9fb99259bbb9d8509137649a1f

                                                                                    SHA256

                                                                                    67c0ad50ed01f2877356c9781b1bd7d3270552a97b5aab5de13c4fa3a78e3f50

                                                                                    SHA512

                                                                                    781836587c5621f685deb701d1161b2ee8040bcd0dbdeba73989a931bb113869e8955f3d88df6d0f4fb4726b11c0da06ca2550b1d69a113091d7476d1dbf1e88

                                                                                  • \Users\Admin\AppData\Local\Temp\is-EHNLP.tmp\_isetup\_isdecmp.dll

                                                                                    Filesize

                                                                                    28KB

                                                                                    MD5

                                                                                    077cb4461a2767383b317eb0c50f5f13

                                                                                    SHA1

                                                                                    584e64f1d162398b7f377ce55a6b5740379c4282

                                                                                    SHA256

                                                                                    8287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64

                                                                                    SHA512

                                                                                    b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547

                                                                                  • \Users\Admin\AppData\Local\Temp\is-ITUGU.tmp\FontCreator.tmp

                                                                                    Filesize

                                                                                    3.2MB

                                                                                    MD5

                                                                                    945ec37b9971c5e9f26fafad6edfd46e

                                                                                    SHA1

                                                                                    35aeeedfab069194aa41f64df0e96780c30837b4

                                                                                    SHA256

                                                                                    c2e55aa7241dde41ed9690bd369e62a49d78ad2662c500509ff88ff8342a487f

                                                                                    SHA512

                                                                                    283f3e98def0b0f249c5b7cb1d6c0deb6fe922d3d4a68edf180e791a96f7c18c678e7b4848b5fb03b6c25038be9850b815b426674a93ea410c430cb261a3f226

                                                                                  • memory/300-144-0x0000000000A80000-0x0000000000D2C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/300-791-0x0000000000A80000-0x0000000000D2C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/300-804-0x0000000000A80000-0x0000000000D2C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/744-809-0x0000000000010000-0x00000000008C5000-memory.dmp

                                                                                    Filesize

                                                                                    8.7MB

                                                                                  • memory/1220-969-0x0000000000A80000-0x0000000000B5C000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/1248-1136-0x0000000000360000-0x00000000006A3000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/1512-905-0x0000000000A20000-0x0000000000D63000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/1556-1065-0x0000000000900000-0x0000000000C0A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/1556-1182-0x0000000000900000-0x0000000000C0A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/1556-857-0x0000000000900000-0x0000000000C0A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/1556-1085-0x0000000000900000-0x0000000000C0A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/1624-837-0x0000000000AF0000-0x0000000000B72000-memory.dmp

                                                                                    Filesize

                                                                                    520KB

                                                                                  • memory/1624-825-0x00000000012F0000-0x0000000001376000-memory.dmp

                                                                                    Filesize

                                                                                    536KB

                                                                                  • memory/1724-1112-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/1724-1116-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/1724-1114-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1724-1110-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/1724-1115-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/1840-200-0x00000000011E0000-0x00000000018B0000-memory.dmp

                                                                                    Filesize

                                                                                    6.8MB

                                                                                  • memory/1924-112-0x0000000006E10000-0x00000000072DE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/1924-53-0x0000000000FE0000-0x00000000014AE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/1924-67-0x0000000006E10000-0x00000000072DE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/1924-69-0x0000000006E10000-0x00000000072DE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/1924-68-0x0000000000FE0000-0x00000000014AE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/2072-971-0x0000000000240000-0x0000000000583000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/2076-4-0x0000000000C10000-0x00000000010C1000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2076-19-0x0000000006E60000-0x0000000007311000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2076-17-0x0000000000C10000-0x00000000010C1000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2076-3-0x0000000000C10000-0x00000000010C1000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2076-2-0x0000000000C11000-0x0000000000C3F000-memory.dmp

                                                                                    Filesize

                                                                                    184KB

                                                                                  • memory/2076-1-0x00000000771C0000-0x00000000771C2000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/2076-0-0x0000000000C10000-0x00000000010C1000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2172-91-0x0000000000270000-0x00000000004D1000-memory.dmp

                                                                                    Filesize

                                                                                    2.4MB

                                                                                  • memory/2172-225-0x0000000000270000-0x00000000004D1000-memory.dmp

                                                                                    Filesize

                                                                                    2.4MB

                                                                                  • memory/2172-113-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                    Filesize

                                                                                    972KB

                                                                                  • memory/2560-973-0x0000000000A80000-0x0000000000B5C000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/2560-1084-0x0000000000180000-0x0000000000248000-memory.dmp

                                                                                    Filesize

                                                                                    800KB

                                                                                  • memory/2560-959-0x0000000000A80000-0x0000000000B5C000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/2608-907-0x0000000000210000-0x00000000002EC000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/2608-872-0x0000000000210000-0x00000000002EC000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/2624-1035-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1025-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1027-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1023-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1029-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1031-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1034-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/2624-1033-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2800-903-0x0000000000210000-0x00000000002EC000-memory.dmp

                                                                                    Filesize

                                                                                    880KB

                                                                                  • memory/2816-24-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-106-0x0000000006910000-0x0000000006DDE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/2816-107-0x00000000062E0000-0x000000000658C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/2816-52-0x0000000006910000-0x0000000006DDE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/2816-28-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-143-0x00000000062A0000-0x000000000654C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/2816-21-0x00000000003B1000-0x00000000003DF000-memory.dmp

                                                                                    Filesize

                                                                                    184KB

                                                                                  • memory/2816-947-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-29-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-22-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-100-0x0000000006910000-0x0000000006DDE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/2816-30-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-784-0x00000000062A0000-0x000000000654C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/2816-20-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-49-0x0000000006910000-0x0000000006DDE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/2816-51-0x0000000009F80000-0x000000000A431000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-111-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/2816-201-0x00000000062E0000-0x000000000658C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/2816-787-0x00000000003B0000-0x0000000000861000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3024-1166-0x0000000006EC0000-0x00000000075FA000-memory.dmp

                                                                                    Filesize

                                                                                    7.2MB

                                                                                  • memory/3024-855-0x0000000006B80000-0x0000000006E8A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/3024-71-0x0000000001200000-0x00000000016CE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/3024-88-0x0000000006560000-0x00000000067C1000-memory.dmp

                                                                                    Filesize

                                                                                    2.4MB

                                                                                  • memory/3024-89-0x0000000006560000-0x00000000067C1000-memory.dmp

                                                                                    Filesize

                                                                                    2.4MB

                                                                                  • memory/3024-1165-0x0000000006EC0000-0x00000000075FA000-memory.dmp

                                                                                    Filesize

                                                                                    7.2MB

                                                                                  • memory/3024-199-0x0000000001200000-0x00000000016CE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/3024-134-0x0000000001200000-0x00000000016CE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/3024-838-0x0000000001200000-0x00000000016CE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/3024-1617-0x0000000006560000-0x00000000067C1000-memory.dmp

                                                                                    Filesize

                                                                                    2.4MB

                                                                                  • memory/3024-1613-0x0000000006560000-0x00000000067C1000-memory.dmp

                                                                                    Filesize

                                                                                    2.4MB

                                                                                  • memory/3024-1063-0x0000000006B80000-0x0000000006E8A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/3024-1064-0x0000000006B80000-0x0000000006E8A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/3024-1059-0x0000000001200000-0x00000000016CE000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/3024-856-0x0000000006B80000-0x0000000006E8A000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/3044-786-0x0000000000FA0000-0x000000000124C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/3044-322-0x0000000000FA0000-0x000000000124C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/3044-110-0x0000000000FA0000-0x000000000124C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/3044-109-0x0000000000FA0000-0x000000000124C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB

                                                                                  • memory/3044-108-0x0000000000FA0000-0x000000000124C000-memory.dmp

                                                                                    Filesize

                                                                                    2.7MB