Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 18:50

General

  • Target

    0c14104ee0f0153dbcdad60a88871161a5aebd1c01cf552a10b48bbb0696ea62.exe

  • Size

    6.0MB

  • MD5

    3b9d61dd4bb2a18019e69bf0fe0ffea8

  • SHA1

    317f2010c1f23015e317c99a6921cf7aa5c3131a

  • SHA256

    0c14104ee0f0153dbcdad60a88871161a5aebd1c01cf552a10b48bbb0696ea62

  • SHA512

    6244ef7e0a12523f16dfa0ea9d1c14c0b9cfd5477724285f3228a15bde348516f7f0a4dbae6c0dbc4d6eb61cf1a414075b61c0468f818ff01f637be4cab7fd32

  • SSDEEP

    196608:KXrZIAK/g+LJNjpTsUBE9y4aULjDIcc/B:KbRcHlTV69qCDI5

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • XMRig Miner payload 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 20 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 50 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c14104ee0f0153dbcdad60a88871161a5aebd1c01cf552a10b48bbb0696ea62.exe
    "C:\Users\Admin\AppData\Local\Temp\0c14104ee0f0153dbcdad60a88871161a5aebd1c01cf552a10b48bbb0696ea62.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3T43.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3T43.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7u47.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7u47.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1n75c8.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1n75c8.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:228
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:400
            • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe
              "C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5680
              • C:\Windows\Temp\{407038C2-4C10-4F53-B0C8-72626D84FB9A}\.cr\sxqnmytm.exe
                "C:\Windows\Temp\{407038C2-4C10-4F53-B0C8-72626D84FB9A}\.cr\sxqnmytm.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe" -burn.filehandle.attached=672 -burn.filehandle.self=680
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:5732
                • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\ActiveISO.exe
                  "C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\ActiveISO.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4584
                  • C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
                    C:\Users\Admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:5456
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:5836
                      • C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                        C:\Users\Admin\AppData\Local\Temp\DriverProtectv1.exe
                        11⤵
                        • Loads dropped DLL
                        PID:4576
            • C:\Users\Admin\AppData\Local\Temp\1004423001\d66c5920f1.exe
              "C:\Users\Admin\AppData\Local\Temp\1004423001\d66c5920f1.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5928
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5928 -s 1560
                7⤵
                • Program crash
                PID:6140
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5928 -s 1592
                7⤵
                • Program crash
                PID:868
            • C:\Users\Admin\AppData\Local\Temp\1004424001\a79ae0939c.exe
              "C:\Users\Admin\AppData\Local\Temp\1004424001\a79ae0939c.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6228
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              6⤵
                PID:6484
              • C:\Users\Admin\AppData\Local\Temp\1004426001\d173c7f293.exe
                "C:\Users\Admin\AppData\Local\Temp\1004426001\d173c7f293.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:6636
              • C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe
                "C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe"
                6⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1396
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2500
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                  7⤵
                    PID:4668
                    • C:\Windows\system32\wusa.exe
                      wusa /uninstall /kb:890830 /quiet /norestart
                      8⤵
                        PID:6696
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe stop UsoSvc
                      7⤵
                      • Launches sc.exe
                      PID:4432
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                      7⤵
                      • Launches sc.exe
                      PID:6688
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe stop wuauserv
                      7⤵
                      • Launches sc.exe
                      PID:6752
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe stop bits
                      7⤵
                      • Launches sc.exe
                      PID:4888
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe stop dosvc
                      7⤵
                      • Launches sc.exe
                      PID:4160
                    • C:\Windows\system32\powercfg.exe
                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                      7⤵
                      • Power Settings
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6984
                    • C:\Windows\system32\powercfg.exe
                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                      7⤵
                      • Power Settings
                      • Suspicious use of AdjustPrivilegeToken
                      PID:436
                    • C:\Windows\system32\powercfg.exe
                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                      7⤵
                      • Power Settings
                      • Suspicious use of AdjustPrivilegeToken
                      PID:7016
                    • C:\Windows\system32\powercfg.exe
                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                      7⤵
                      • Power Settings
                      • Suspicious use of AdjustPrivilegeToken
                      PID:7012
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe delete "GDRQRNRG"
                      7⤵
                      • Launches sc.exe
                      PID:3428
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe create "GDRQRNRG" binpath= "C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe" start= "auto"
                      7⤵
                      • Launches sc.exe
                      PID:4548
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe stop eventlog
                      7⤵
                      • Launches sc.exe
                      PID:4068
                    • C:\Windows\system32\sc.exe
                      C:\Windows\system32\sc.exe start "GDRQRNRG"
                      7⤵
                      • Launches sc.exe
                      PID:2920
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r4221.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r4221.exe
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:336
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 1584
                  5⤵
                  • Program crash
                  PID:60
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 1584
                  5⤵
                  • Program crash
                  PID:2568
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3W78P.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3W78P.exe
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3892
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N738I.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N738I.exe
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1668
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3016
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4692
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2772
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2340
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3304
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:32
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                4⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3036
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1de1a51-b5c5-43c4-b209-3ee969fadf4f} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" gpu
                  5⤵
                    PID:1748
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6aefe74-3449-4ba0-95ed-88726592f047} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" socket
                    5⤵
                      PID:1800
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3376 -childID 1 -isForBrowser -prefsHandle 3184 -prefMapHandle 3200 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b07f778-5e3b-40de-9dd3-99c1fd16b7d1} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" tab
                      5⤵
                        PID:2140
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3944 -childID 2 -isForBrowser -prefsHandle 3936 -prefMapHandle 3876 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe50a982-9f79-4472-a28b-b0d43578a32f} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" tab
                        5⤵
                          PID:1464
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5064 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4868 -prefMapHandle 5040 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ded032b5-88d2-4b09-aeb7-ffee70a32bb4} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" utility
                          5⤵
                          • Checks processor information in registry
                          PID:7028
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 3 -isForBrowser -prefsHandle 5456 -prefMapHandle 5432 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b43f026-9b22-4a4d-b623-8f795a021824} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" tab
                          5⤵
                            PID:5136
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5616 -childID 4 -isForBrowser -prefsHandle 5572 -prefMapHandle 5436 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {714dd0fb-7a46-493e-9274-f6909921944f} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" tab
                            5⤵
                              PID:5172
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5796 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b0c56de-f5af-4fc9-8038-317757845af6} 3036 "\\.\pipe\gecko-crash-server-pipe.3036" tab
                              5⤵
                                PID:5228
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 336 -ip 336
                        1⤵
                          PID:4068
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 336 -ip 336
                          1⤵
                            PID:3184
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5928 -ip 5928
                            1⤵
                              PID:6100
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5928 -ip 5928
                              1⤵
                                PID:6108
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5884
                              • C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe
                                C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe
                                1⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2964
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:32
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                  2⤵
                                    PID:5392
                                    • C:\Windows\system32\wusa.exe
                                      wusa /uninstall /kb:890830 /quiet /norestart
                                      3⤵
                                        PID:5580
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop UsoSvc
                                      2⤵
                                      • Launches sc.exe
                                      PID:5512
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                      2⤵
                                      • Launches sc.exe
                                      PID:5596
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop wuauserv
                                      2⤵
                                      • Launches sc.exe
                                      PID:5668
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop bits
                                      2⤵
                                      • Launches sc.exe
                                      PID:5076
                                    • C:\Windows\system32\sc.exe
                                      C:\Windows\system32\sc.exe stop dosvc
                                      2⤵
                                      • Launches sc.exe
                                      PID:5804
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                      2⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5552
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                      2⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5812
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                      2⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5820
                                    • C:\Windows\system32\powercfg.exe
                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                      2⤵
                                      • Power Settings
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4700
                                    • C:\Windows\system32\conhost.exe
                                      C:\Windows\system32\conhost.exe
                                      2⤵
                                        PID:5184
                                      • C:\Windows\system32\notepad.exe
                                        notepad.exe
                                        2⤵
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3176
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:6136

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp

                                      Filesize

                                      19KB

                                      MD5

                                      61aa2a5c01dbe9243c91c847a114ff7e

                                      SHA1

                                      c1255a31d6607490e14b0d7f1be2a5b9826468d5

                                      SHA256

                                      40b0de64cb48ddcc48b07434a08281e8b91cfc609fe3815172059257b8f42781

                                      SHA512

                                      58f84d890b14ef1049e93caebfdbf4c5541770a720260a06a272a86956ed26f504958e43a734fe3b4a46d56709da1f40bfecbc75d924955f6ee6ecf7714f8978

                                    • C:\Users\Admin\AppData\Local\Temp\1004354001\sxqnmytm.exe

                                      Filesize

                                      14.4MB

                                      MD5

                                      155422526c81faf880ec711b7044ef44

                                      SHA1

                                      67b6a590e3aac3cca79d849ef1ac9f51f4e6702b

                                      SHA256

                                      3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a

                                      SHA512

                                      0a53e0b00e5c32782be998a082cc33bf5b19d162f81e39104f6fd6f64b1ea4947e69298493dcb49a1386904cc345c63395044c01be2d49c89647d7890522dbdc

                                    • C:\Users\Admin\AppData\Local\Temp\1004423001\d66c5920f1.exe

                                      Filesize

                                      3.0MB

                                      MD5

                                      08e058cf084f3844eaf16768b8d0fee6

                                      SHA1

                                      e3234cfd97054c5d59d669631415da44f2643958

                                      SHA256

                                      309dd4a3446c087863dbaa7c5712e884bbc73bc20df663aac8d2aafb6b92278a

                                      SHA512

                                      912d29c9c8389bf3895a4766d24cebf100167efbebdbd27dc09e8099b027e02bcd00506490d426ac627e97ea0704eb0dc94d0c858318fb8f5bda1b2a184a8c95

                                    • C:\Users\Admin\AppData\Local\Temp\1004424001\a79ae0939c.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      15cbd9b38ee0965dd301e40b1febe423

                                      SHA1

                                      fa6fb0fe1ab51063ad15c4cc36d7f2988622bffd

                                      SHA256

                                      fd23f8fa45a5d50250de890fcb6fbfa841c929e19936dc0eaacaca1c6f3f3a2e

                                      SHA512

                                      81a15df2bf1002092fc7ac6aec533a4c7ca2f6bde8bb29fdd027ba2db4d73760e4547bb72f0cf2d9440974759fb515bf06be3c1a7cf8f52c63008ebc0b49c19e

                                    • C:\Users\Admin\AppData\Local\Temp\1004426001\d173c7f293.exe

                                      Filesize

                                      2.7MB

                                      MD5

                                      bc08cdfa0f7e0ff8ce4ce2b6e34d2cf0

                                      SHA1

                                      42c3e1f582916dd1b7472d0608a69ba027089790

                                      SHA256

                                      bb8a90f875cf35b9bf9ffb88fe4cce38531a87303aeb96baf1dce2d2d8e52c89

                                      SHA512

                                      883bbf0b0f31b8866cea28c1d1aa382cf4426bcb4caf2f94302cfed5e95f190254585dc126d57440fead81928bce6d7b9d4db0a1c33e190b3414a2c62e3d6d67

                                    • C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe

                                      Filesize

                                      5.0MB

                                      MD5

                                      d0fc461b72469a7863f1cfc160289437

                                      SHA1

                                      a4995f29d631ac92748b4171c1f985709e36f0bc

                                      SHA256

                                      f038f6caf4194e8382830057a069646a213fd2d3bd30855d7ae59c052019bb25

                                      SHA512

                                      e138b7b329f4c779e90bfe1447395bcaeac1dcdd97849576ab8dd51baaad45050b400442964fc66efabf125be3cd41e14a2aaeda7477e95482aa13dcaf01e80e

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4N738I.exe

                                      Filesize

                                      898KB

                                      MD5

                                      668407c8278df6c8916cfd80f24a143f

                                      SHA1

                                      fd9de5c843e4ba8ba008f7685dd82bda7e56d083

                                      SHA256

                                      9914779f774e0a9bf456878af49caf17aa6a13b1c96102582603e374cb372930

                                      SHA512

                                      a26a00ab561250552bede78bfa494e7d54a543cffca04f37ac161e6bd364be1b99d63b9f4c32b9bb663f6aafae096dfd245351cb47a43f093fec3ce76d298b07

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3T43.exe

                                      Filesize

                                      5.6MB

                                      MD5

                                      c7bff764e8a939c401375f5f1388e59b

                                      SHA1

                                      b89ace9f60ab02560d4e62b744145921f168991c

                                      SHA256

                                      27c343cf71dbbcbe8a264baf50c9d0e16b5614f0737c7a82758c63e36b800136

                                      SHA512

                                      86da22e7ae852709e831b24aba51f6b1e974ab77e8dd1d2eb2428e763cc5f94d958387100e1541338bba6c85b7bcf7a6637f271cfff977f4ac3e98d9b945af2f

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3W78P.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      fa6b75ebc4cf564a1055c63db94bcd64

                                      SHA1

                                      75325bd377846c171213b10261d640b33c4a1d7f

                                      SHA256

                                      e6ca41bc8e9972f791ddc6bb97e6247d0c7f1d0a18f02ec97d2d63dc1f3e3451

                                      SHA512

                                      26084e3abba1f9e37ceb4ab858045b33efea12c81699e7ceab34459d2675cb57a906db6728dad64213bdfc52a1843c733e750ed1eba75f3e73acbb15df170679

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7u47.exe

                                      Filesize

                                      3.5MB

                                      MD5

                                      e511e6360abe0c5ea58abd6470834830

                                      SHA1

                                      cb8e57010603b363e39d06787525ce761f768081

                                      SHA256

                                      ecb34bc9d2bdeedee1ccede5b57ef121cf23418ba3e0fa0420b340e477986d81

                                      SHA512

                                      c08c8978e08ed9293b0cf77ab78461dc496647e37d6a6989f1f2bca5853c5a3c04bef2d2558a72f51b6e71e90b4f15582111469f8e0f1bc41d39494100b16d51

                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1n75c8.exe

                                      Filesize

                                      3.1MB

                                      MD5

                                      aec56671d0758eaff92926d21fac8693

                                      SHA1

                                      084b183a609a1c2c70d860757257082a563e7bc4

                                      SHA256

                                      9aa772b16838edca5370628672880f7263cf78f1661e8622fd22701090456306

                                      SHA512

                                      c40e653996c1a2d6924a6dd9cbf26155b84eae1a9778e8ff8a55c740c8fa18d6f944fc1fdcbee76804f7c0bb0fad4f80e4f2b3ae6175134d52111207db25579e

                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2r4221.exe

                                      Filesize

                                      3.0MB

                                      MD5

                                      1e89027e4db2c2f57e9b4db8b00200c7

                                      SHA1

                                      435f869057bc76c9e7596d7740deb51f4ba59260

                                      SHA256

                                      b2dd3033c8dd8bf7218e42ebb0684c416b63748398c1bcba039e8a37c54bb9fe

                                      SHA512

                                      562c1f65607b95d05ce3c55bdb9a15a9c4a3752c5bc92a5c36fd5aa7846f06d437f6f39adb1b8322583c7d5008ea88ce9d842ad9648f79c5fa4f60bbc3bc70a8

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fupx5skq.grd.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      479KB

                                      MD5

                                      09372174e83dbbf696ee732fd2e875bb

                                      SHA1

                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                      SHA256

                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                      SHA512

                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-2

                                      Filesize

                                      13.8MB

                                      MD5

                                      0a8747a2ac9ac08ae9508f36c6d75692

                                      SHA1

                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                      SHA256

                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                      SHA512

                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                      Filesize

                                      8KB

                                      MD5

                                      d5674e5ff8fe523d0c10d1c0a944ad08

                                      SHA1

                                      4d71237b466e30828fe2db3573a964b65f29036b

                                      SHA256

                                      40915f263d9bbd677cf0c7b9198e66fc70810cd0d7264c36ca0bc59d83bcb8ba

                                      SHA512

                                      52a79c907bf945d6c51743f2e96968546d402f7a7e47b66f7de3a10e3750fe6ef12886a82136cc7399b50caf5729d2d714abbc75f6d963a830fbe224eafd0309

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                      Filesize

                                      6KB

                                      MD5

                                      86936b1a182e8124fcb5e6b87cd3f18c

                                      SHA1

                                      022ba3ed89dfc40fe5f162a532c6a43c702a193f

                                      SHA256

                                      3ce212c17576dfb61f79c296a59ee92305a2423f76ca2338288546811cf04bf7

                                      SHA512

                                      e13914e9e5947c3dd67f37d3cb5dccd4e5c650fe12a564564d703ab81cf469551d414ce839257dbce7b406729c622c3155e5ff317d0dfca9519ec86e4b75cf42

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                      Filesize

                                      18KB

                                      MD5

                                      c9536d80f10137934baeab0effb9b4aa

                                      SHA1

                                      7f4f104e83c0e50f8103b32e646e86e24c66847e

                                      SHA256

                                      21d6b9739e01e71035a859b2fe8d367c4534b47bf7883817606da7e00d0f45af

                                      SHA512

                                      15c53e46213ad19d5e583540dd066468c1df68d510a930fa141bc2c2282f2cc85eb3c6232bcb79c8b249ddffa3babe351211cdba44b1bbf3661a83cb9b15e51c

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                      Filesize

                                      23KB

                                      MD5

                                      79a7d69e468fb8942c88e02b79c7ed2b

                                      SHA1

                                      21f3d9a82b1e1f873042d8d5c2d3661f9e59c033

                                      SHA256

                                      a49268d2abdf0d97f31bb62d5d6992ceaeddba1fb6e3f2333ed5bbcdf23f2be3

                                      SHA512

                                      e900dec8db797a8316d0845a84b1c5f7f0bbd0285e411e12d0207f4f2733d3ad716b3d57fbf4a27d787e4cd0180d9ce6e684aaf76760a368f06be8e6877cb817

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                      Filesize

                                      5KB

                                      MD5

                                      6713ab26a2bea1716c328ba62026eb70

                                      SHA1

                                      4b6bcce8ef6c35d06a98d9ec783266fb205aeaf7

                                      SHA256

                                      5e716a1d6f3b292808e5d452f434c44302af786afed7ff5b0c80f41745fe898f

                                      SHA512

                                      aee848d2c6525b194c6d6453dc63e3d7b6fb20aff3d44687adf0b007669ff7065fe9ce6fd38f295be734d0c1921ccd6ec0c8a4313bb6020c52b48f91fb13bacb

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      ec89b57224688771f61e801b5584bc51

                                      SHA1

                                      59de977167202b84303d1053c0c62780ea7bf5bf

                                      SHA256

                                      d62a032e479afe5f2a32f04615993cf7bbb8a95e18b43dc898ff8fccd3ba4663

                                      SHA512

                                      05e68be222146e953f50020e53f859b811bc737817c77c15a9d5e0eea96fe80533909cc79865c68baa88e9e69ff43a5122a3fd1573909d68aac154257d1cbd07

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      6KB

                                      MD5

                                      67552db82144555b8933ec4fca3cd3f2

                                      SHA1

                                      0b63f3350a9d6c5048d3f6353c4d726e896c79dc

                                      SHA256

                                      7e7e89d6abb197912276394a2c8f8a34f3d9275e7ce6677db0c778885d3c482a

                                      SHA512

                                      12338c05e6d7c9eff2a1c94c8371ab5617ec927e8a10961d2ef9dced41f18a6470774a1a8ae3c02ac1ac48047a7fc3cff8728ba5bf152a2cb95961b1ce660a29

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      29KB

                                      MD5

                                      56760f8157cbb0840ba799c7794128e1

                                      SHA1

                                      1092f3c561960182ea812809a3e0aa97236222f2

                                      SHA256

                                      eaa2deb7b62c5defb76d243f98146513a064fae0675a4769390663046934487c

                                      SHA512

                                      b90edba944e32fe32f6fafd2d4f552c9ff0bc25892d92858fd6ab303aedb9a06071939d99a09ad7a70584c039b9073e229e2613d6311cc6d49dd838fac6dd6f6

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3e2149aa-b35b-4270-81d2-51feee1c115a

                                      Filesize

                                      671B

                                      MD5

                                      694a23686a005b5fc0718e7d05df6fbe

                                      SHA1

                                      e59c70c8d1d1166e41fee4a972b8b96d99dd6f60

                                      SHA256

                                      fa39705008d5e8f4d8e0add2a006beb7299d42fa1ec95f359f4cb15f540bc38f

                                      SHA512

                                      f7e9a59cfadadb9b653a3aef9d2053d90a608fadb6b8bafdecddaf71ca537e9c4150cde265918d6384fe9320a63778b84f0717fd57217332ec6603b75bc28712

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\74675762-a4e8-4c33-9a29-a088a3eb36d6

                                      Filesize

                                      27KB

                                      MD5

                                      9514dce93ea8fd25b7fe28de192351e1

                                      SHA1

                                      778a316dd6e7b61cc64c48a53852eaea164801d4

                                      SHA256

                                      57e16dce79c5d5300aaf886411ea9abfa7a88805bc993ede00becac29df6cd59

                                      SHA512

                                      2bdb86f87b68a65338849be81b2eb3c54d3aead6af37a850bc585a321311cb89ac522a0d6f7f1186c6cdb699080a638da6989fdcb4037910267c5e1ca7aeb79f

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\f145d542-1908-4c85-9a89-a47f3026d6fa

                                      Filesize

                                      982B

                                      MD5

                                      c8dc08d820cbbd9d7b7d6d3a6773a69c

                                      SHA1

                                      fd384a241b2efb1e4afb5da52867e7b71afeab8f

                                      SHA256

                                      57081270673c47ed28577885e7ac5a89687f6fabca81141cf28379754f43a599

                                      SHA512

                                      2c514d116e527c143e1a4210baca3e91c36665eeea8592842269e813d036c5b2bc3f556b0128e8a3644b6756bdd8b99c4bb6d61d244f5d16b6850f6fed66b90a

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll.tmp

                                      Filesize

                                      1.1MB

                                      MD5

                                      842039753bf41fa5e11b3a1383061a87

                                      SHA1

                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                      SHA256

                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                      SHA512

                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      2a461e9eb87fd1955cea740a3444ee7a

                                      SHA1

                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                      SHA256

                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                      SHA512

                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                      Filesize

                                      479B

                                      MD5

                                      49ddb419d96dceb9069018535fb2e2fc

                                      SHA1

                                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                      SHA256

                                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                      SHA512

                                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      bf957ad58b55f64219ab3f793e374316

                                      SHA1

                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                      SHA256

                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                      SHA512

                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                      Filesize

                                      17.8MB

                                      MD5

                                      daf7ef3acccab478aaa7d6dc1c60f865

                                      SHA1

                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                      SHA256

                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                      SHA512

                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp

                                      Filesize

                                      1KB

                                      MD5

                                      688bed3676d2104e7f17ae1cd2c59404

                                      SHA1

                                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                      SHA256

                                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                      SHA512

                                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp

                                      Filesize

                                      1KB

                                      MD5

                                      36e5ee071a6f2f03c5d3889de80b0f0d

                                      SHA1

                                      cf6e8ddb87660ef1ef84ae36f97548a2351ac604

                                      SHA256

                                      6be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683

                                      SHA512

                                      99b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                      Filesize

                                      11KB

                                      MD5

                                      75922a8fe60f01d924d4e5718936c7d6

                                      SHA1

                                      7b53a7840a9cebea94f12e28786fd9c6b7c55275

                                      SHA256

                                      f4c234917946bc43331385d5bef57c24306719768f8f6465d88150622dd56d3f

                                      SHA512

                                      292349c92022fee0983dee03357dbbe5e9dde63b32a0cc73b99472dbae367694184bd25958898b16de412f4f733a1c58bdaa09061d563fbc7e799dfab7f744b0

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                      Filesize

                                      12KB

                                      MD5

                                      696a7a18810175dc6baa85daecab0654

                                      SHA1

                                      ee9f84163fed1e6954294dbbe12a1f19f492e6aa

                                      SHA256

                                      97bc28d3d00990c366c05158970dbf40218a88e2b3a2c4f18c303f23998974f4

                                      SHA512

                                      5271caad2f746d1dd1c71ece90c5d248cac932436ccd175d779cd3a17de0bbde780482906c4ffbd8dff366fa36b560775f034b4c281464fac70c87f23f3d1d52

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                      Filesize

                                      10KB

                                      MD5

                                      4a1d07c0fa7bb73fa132b165927fb102

                                      SHA1

                                      e84fff2528e6680b0c3cf810300303143bb1ff5a

                                      SHA256

                                      2ea8b00413567d015bca680df10239e5c673bcec3f12fbbc895d1691543c0edf

                                      SHA512

                                      d19cd95d769d18d1aa908c9f1d4de920495a6dbdeee2e4e27276467285c61a14960ecfe5bdc12f8fae5de13c50700acc03a8a07cb38ffdc593d8aecfd36b6a85

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                      Filesize

                                      10KB

                                      MD5

                                      7b04c63b0f943845891cc9155e2bd5b5

                                      SHA1

                                      64459d35351af172b42a2561df640bcd18481987

                                      SHA256

                                      2955880f06d0e2f96b582f57102d48946c64c0bac22b02e1ea6598174aecc885

                                      SHA512

                                      e7bc98eaac4ec2fdaba6c589ee09b10bdd4a636f4069d3607b8cf2cc78bd91ddca18184ef4ad3b8d65a2f5637995a3954dfd5fa4190d0f87da08f0e4cc2ded6f

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\ActiveISO.exe

                                      Filesize

                                      1.2MB

                                      MD5

                                      b84dfabe933d1160f624693d94779ce5

                                      SHA1

                                      ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f

                                      SHA256

                                      588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd

                                      SHA512

                                      eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\Bichromate.dll

                                      Filesize

                                      1.4MB

                                      MD5

                                      86b7452f87b5c7f79f8b8a3ad326035e

                                      SHA1

                                      a81ba71c0b3f93c6bcdc004ede3f98f205dd31ca

                                      SHA256

                                      58a6b1fe90145f8ae431d05952d1751e705ae46a81be1c2257f5e1e0ce0292c7

                                      SHA512

                                      4c0e8166a8ee81c9e851fe7d25915b1d85bbe3b274e88160ff948ddb8a15f67122a52ba3906da6a090f8ba064915c8df1780103e474bf8e6f3dd673fc304ce7b

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\Qt5Core.dll

                                      Filesize

                                      5.8MB

                                      MD5

                                      6e8bfe548ca4de868c82279e5d127db0

                                      SHA1

                                      120cbd2177493859c40b943bed3d124555cc5bd9

                                      SHA256

                                      f7bddcd19a740e179827a99c23cc045d6f4ab8d5b6699592b1a1e8fcb6ddc22f

                                      SHA512

                                      9f4736a432ea496c010a5a37a87da1fcee6bafb2c6600eacaa8a0b0e9d47eb8bf0b044cf34d6212d871d4b1bd93339d148b67c72a8226145929d117756ece6b0

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\Qt5Gui.dll

                                      Filesize

                                      6.2MB

                                      MD5

                                      34893cb3d9a2250f0edecd68aedb72c7

                                      SHA1

                                      37161412df2c1313a54749fe6f33e4dbf41d128a

                                      SHA256

                                      ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

                                      SHA512

                                      484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\Qt5Network.dll

                                      Filesize

                                      1.3MB

                                      MD5

                                      fe5ed4c5da03077f98c3efa91ecefd81

                                      SHA1

                                      e23e839ec0602662788f761ebe7dd4b39c018a7f

                                      SHA256

                                      d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b

                                      SHA512

                                      22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\Qt5PrintSupport.dll

                                      Filesize

                                      316KB

                                      MD5

                                      d0634933db2745397a603d5976bee8e7

                                      SHA1

                                      ddec98433bcfec1d9e38557d803bc73e1ff883b6

                                      SHA256

                                      7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

                                      SHA512

                                      9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\Qt5Widgets.dll

                                      Filesize

                                      5.3MB

                                      MD5

                                      c502bb8a4a7dc3724ab09292cd3c70d6

                                      SHA1

                                      ff44fddeec2d335ec0eaa861714b561f899675fd

                                      SHA256

                                      4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

                                      SHA512

                                      73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\StarBurn.dll

                                      Filesize

                                      1.4MB

                                      MD5

                                      41e19ba2364f2c834b2487e1d02bb99a

                                      SHA1

                                      6c61d603dddfe384a93ad33775b70681d0a396d9

                                      SHA256

                                      c040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340

                                      SHA512

                                      6ebf4a9e80f16c6a03ff357d2da9a34a4227bfd65eb66d1d335349a77ba066d069ba0d47d46229b3c77b59052c42d388678662f970b418d8cc3cfb1223427d8c

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\jri

                                      Filesize

                                      4.3MB

                                      MD5

                                      66f309482f529590cf5ad56549effbef

                                      SHA1

                                      76c9117e6356203daed79c1caecb4808436aef36

                                      SHA256

                                      d704f5f01487ca3340454240868515de1a43a1b65e5b4a97a74ab409c8441f82

                                      SHA512

                                      9b2068943a6f6db6b9e885a3b3b7ea6da9f7a9971767780e02184e10674395b3dd7f3b539c04d9acbacf8f39042fdb90f3c9cb5986c2076846626ea5decb3d01

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\msvcp140.dll

                                      Filesize

                                      557KB

                                      MD5

                                      7db24201efea565d930b7ec3306f4308

                                      SHA1

                                      880c8034b1655597d0eebe056719a6f79b60e03c

                                      SHA256

                                      72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

                                      SHA512

                                      bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\vcruntime140.dll

                                      Filesize

                                      96KB

                                      MD5

                                      f12681a472b9dd04a812e16096514974

                                      SHA1

                                      6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                      SHA256

                                      d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                      SHA512

                                      7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\vcruntime140_1.dll

                                      Filesize

                                      37KB

                                      MD5

                                      75e78e4bf561031d39f86143753400ff

                                      SHA1

                                      324c2a99e39f8992459495182677e91656a05206

                                      SHA256

                                      1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

                                      SHA512

                                      ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

                                    • C:\Windows\Temp\{0540B818-69EB-4B5E-A7A5-4B19201242A6}\.ba\yodpxub

                                      Filesize

                                      21KB

                                      MD5

                                      65ced4e3e5b641b3fee1e135e3604a1a

                                      SHA1

                                      860173020684e54f4eb9bc9e4fdab348b371214d

                                      SHA256

                                      1a5991a30e9d339cbb0143d4bd134509cf4effc7fead7f4f7dcc059990efd669

                                      SHA512

                                      cc4ec199a58a20d2c4543fd247b329422ce3ad15695c74d2aa4fc89dc780a274527b020157e6c23f8a2a4839209f5d742694881768dd12c9b80c622da17f31e6

                                    • C:\Windows\Temp\{407038C2-4C10-4F53-B0C8-72626D84FB9A}\.cr\sxqnmytm.exe

                                      Filesize

                                      14.3MB

                                      MD5

                                      73e9ab1674c64f040da642b6a4690356

                                      SHA1

                                      e5a508bf8a7170cbacd6e6ab0259073a2a07b3cf

                                      SHA256

                                      04bb4867d35e77e8e391f3829cf07a542a73815fc8be975a7733790d6e04243c

                                      SHA512

                                      f1df00e8f0b7b1c577429028cd550788dbf4f1da1e8aa97b8ab845e68c56663c350c562f26237a278a0b44b33f06dcb9667a50db4ddaf747da71053e4189afec

                                    • memory/32-1207-0x000001DBF4A10000-0x000001DBF4AC5000-memory.dmp

                                      Filesize

                                      724KB

                                    • memory/32-1211-0x000001DBF46B0000-0x000001DBF46CA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/32-1213-0x000001DBF4680000-0x000001DBF4686000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/32-1214-0x000001DBF46D0000-0x000001DBF46DA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/32-1212-0x000001DBF4670000-0x000001DBF4678000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/32-1210-0x000001DBF41B0000-0x000001DBF41BA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/32-1209-0x000001DBF4690000-0x000001DBF46AC000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/32-1208-0x000001DBF41A0000-0x000001DBF41AA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/32-1206-0x000001DBF4650000-0x000001DBF466C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/228-21-0x0000000000120000-0x0000000000446000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/228-35-0x0000000000120000-0x0000000000446000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/336-40-0x00000000007A0000-0x0000000000AA6000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/336-39-0x00000000007A0000-0x0000000000AA6000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/400-33-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1246-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1149-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-49-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1143-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1090-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1167-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-884-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-54-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-879-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1255-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-828-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1174-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1248-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1134-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/400-1138-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2500-1175-0x000001D450D10000-0x000001D450D32000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3176-1230-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1225-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1227-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1233-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1236-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1235-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1237-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1234-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1232-0x0000025849010000-0x0000025849030000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/3176-1231-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1229-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1228-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3176-1226-0x0000000140000000-0x0000000140848000-memory.dmp

                                      Filesize

                                      8.3MB

                                    • memory/3892-45-0x00000000005C0000-0x0000000000CE9000-memory.dmp

                                      Filesize

                                      7.2MB

                                    • memory/3892-44-0x00000000005C0000-0x0000000000CE9000-memory.dmp

                                      Filesize

                                      7.2MB

                                    • memory/4576-1241-0x00007FF6E3D10000-0x00007FF6E3FF3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4576-1173-0x00007FF6E3D10000-0x00007FF6E3FF3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4576-1147-0x00007FF6E3D10000-0x00007FF6E3FF3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4576-1148-0x00007FF6E3D10000-0x00007FF6E3FF3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4576-1247-0x00007FF6E3D10000-0x00007FF6E3FF3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4576-1168-0x00007FF6E3D10000-0x00007FF6E3FF3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4584-998-0x00007FF93F030000-0x00007FF93F57E000-memory.dmp

                                      Filesize

                                      5.3MB

                                    • memory/4584-1003-0x00007FF9434A0000-0x00007FF943612000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/5184-1224-0x0000000140000000-0x000000014000E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5184-1221-0x0000000140000000-0x000000014000E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5184-1217-0x0000000140000000-0x000000014000E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5184-1218-0x0000000140000000-0x000000014000E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5184-1219-0x0000000140000000-0x000000014000E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5184-1220-0x0000000140000000-0x000000014000E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5456-1102-0x00007FF9528C0000-0x00007FF952A32000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/5456-1047-0x00007FF93DEB0000-0x00007FF93E3FE000-memory.dmp

                                      Filesize

                                      5.3MB

                                    • memory/5456-1095-0x00007FF9528C0000-0x00007FF952A32000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/5836-1140-0x0000000074150000-0x00000000742CB000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/5836-1132-0x00007FF961130000-0x00007FF961325000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/5884-1101-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/5928-852-0x0000000000C30000-0x0000000000F37000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/5928-827-0x0000000000C30000-0x0000000000F37000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/6136-1238-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/6136-1240-0x0000000000390000-0x00000000006B6000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/6228-850-0x0000000000A90000-0x00000000011C3000-memory.dmp

                                      Filesize

                                      7.2MB

                                    • memory/6228-854-0x0000000000A90000-0x00000000011C3000-memory.dmp

                                      Filesize

                                      7.2MB

                                    • memory/6636-889-0x0000000000240000-0x0000000000502000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/6636-882-0x0000000000240000-0x0000000000502000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/6636-883-0x0000000000240000-0x0000000000502000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/6636-881-0x0000000000240000-0x0000000000502000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/6636-886-0x0000000000240000-0x0000000000502000-memory.dmp

                                      Filesize

                                      2.8MB