Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2024, 14:16

General

  • Target

    file.exe

  • Size

    1.7MB

  • MD5

    ca0ad971e610676ade1d3af832c47135

  • SHA1

    ee9ed8a2f7c83cc8106f13c949b5ad134d16b0a5

  • SHA256

    9b5e3da919a3b72949ab9fbfa36b987144e04cf5dab0c275d1afb2b843b4bca9

  • SHA512

    c73aac179f75faaea20e8445b1a021fe8f11b11dc212b4863acafa1c5317c8ee4cd4e53bfa4f6a7467c2f0fe6c60313583a3a4d2b57613390609ae45435f4bb5

  • SSDEEP

    49152:IKbUgwbYuzG+kmHOM1LA6JKvFSk52gzZZ:IlgwbYj+dbLA6cvFLnZZ

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://hallowed-noisy.sbs

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8df6bcc40,0x7ff8df6bcc4c,0x7ff8df6bcc58
        3⤵
          PID:1964
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:2
          3⤵
            PID:4944
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:3
            3⤵
              PID:4920
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:8
              3⤵
                PID:3608
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4464
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2500
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3664,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2588
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:8
                3⤵
                  PID:2980
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4520,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:8
                  3⤵
                    PID:4960
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:8
                    3⤵
                      PID:3116
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5004 /prefetch:8
                      3⤵
                        PID:2608
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:8
                        3⤵
                          PID:4036
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:8
                          3⤵
                            PID:1588
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4288,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:2
                            3⤵
                            • Uses browser remote debugging
                            PID:4752
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:616
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8df6c46f8,0x7ff8df6c4708,0x7ff8df6c4718
                            3⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3648
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:2
                            3⤵
                              PID:2664
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3340
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
                              3⤵
                                PID:4836
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:3416
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:3828
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:4480
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:4400
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsAEHIJDAFBK.exe"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2540
                              • C:\Users\Admin\DocumentsAEHIJDAFBK.exe
                                "C:\Users\Admin\DocumentsAEHIJDAFBK.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4352
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                  4⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Adds Run key to start application
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:544
                                  • C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Drops file in Program Files directory
                                    PID:4160
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /nologo /codebase "C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll"
                                      6⤵
                                      • Loads dropped DLL
                                      • Modifies registry class
                                      PID:4332
                                  • C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2252
                                  • C:\Users\Admin\AppData\Local\Temp\1009906001\d44a521567.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009906001\d44a521567.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1476
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 1424
                                      6⤵
                                      • Program crash
                                      PID:5428
                                  • C:\Users\Admin\AppData\Local\Temp\1009911001\419ce7d55d.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009911001\419ce7d55d.exe"
                                    5⤵
                                    • Enumerates VirtualBox registry keys
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3976
                                  • C:\Users\Admin\AppData\Local\Temp\1009912001\b99315288a.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009912001\b99315288a.exe"
                                    5⤵
                                    • Enumerates VirtualBox registry keys
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4008
                                  • C:\Users\Admin\AppData\Local\Temp\1009913001\7090e1c286.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009913001\7090e1c286.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5064
                                  • C:\Users\Admin\AppData\Local\Temp\1009914001\59819216b2.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009914001\59819216b2.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4832
                                  • C:\Users\Admin\AppData\Local\Temp\1009915001\f60607129a.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009915001\f60607129a.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:4964
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM firefox.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3780
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM chrome.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3868
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM msedge.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3544
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM opera.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4352
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM brave.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5044
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                      6⤵
                                        PID:2460
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                          7⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3428
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {571810df-5e7a-461f-a0e9-18a4d1551e45} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" gpu
                                            8⤵
                                              PID:4596
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {307ac2bf-50f7-494e-826e-78977480913c} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" socket
                                              8⤵
                                                PID:896
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1720 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3328 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87fbca40-9aad-480c-8cbd-d4e3455c275b} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab
                                                8⤵
                                                  PID:1400
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3656 -childID 2 -isForBrowser -prefsHandle 3648 -prefMapHandle 3644 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef08ed8b-2a44-4a47-87e7-87fb181f9766} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab
                                                  8⤵
                                                    PID:444
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2816 -prefMapHandle 2812 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d2a5533-8862-4499-a7c6-a122d41d7d09} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" utility
                                                    8⤵
                                                    • Checks processor information in registry
                                                    PID:5236
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 3 -isForBrowser -prefsHandle 5436 -prefMapHandle 5476 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ff29caa-f530-43ce-80ae-edf29381d8ce} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab
                                                    8⤵
                                                      PID:6132
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 4 -isForBrowser -prefsHandle 5600 -prefMapHandle 5604 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2ff2167-5f01-4ed9-839e-dd0af232c155} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab
                                                      8⤵
                                                        PID:1964
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5864 -childID 5 -isForBrowser -prefsHandle 5896 -prefMapHandle 5600 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dff75238-e1d7-487b-bcc9-018e5cf7f3da} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab
                                                        8⤵
                                                          PID:5280
                                                  • C:\Users\Admin\AppData\Local\Temp\1009916001\c6adb9e885.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1009916001\c6adb9e885.exe"
                                                    5⤵
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Windows security modification
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5860
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:4884
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:3044
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4584
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1476 -ip 1476
                                                1⤵
                                                  PID:5304
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5180

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  5dd45593985c6b40d1d2dea0ce9a2fcf

                                                  SHA1

                                                  700fb24d4f4e302ed94f755fa6f7caf9d6fb594e

                                                  SHA256

                                                  237e715b292e3ebfdf7038d42290f9a6457f0375ee965e1236bd763bce413391

                                                  SHA512

                                                  ca4e7df463b3d5643decfda936e4d7db1e3247c8f27a25ace150886a0c3ec2e79f1d82d2c4cbd5b89f42deaf4cd5709a7ca47d24a18ed1e1804b0c1e016966a3

                                                • C:\ProgramData\mozglue.dll

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                  SHA1

                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                  SHA256

                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                  SHA512

                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                • C:\ProgramData\nss3.dll

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                  SHA1

                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                  SHA256

                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                  SHA512

                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                  Filesize

                                                  649B

                                                  MD5

                                                  bcaad424a579913580868b35842fb793

                                                  SHA1

                                                  8025b58dfd8db61048592db845099e0c093c04c0

                                                  SHA256

                                                  2ed0c6011b6c9a465f66900a31717a7f27370a1e125337f7652606d2d38efaf8

                                                  SHA512

                                                  5474e2a20cb1b0c7d5e56470c2d024031f0dd8cf67e385306d617ab5b3eb55034ad608c87f8581bfb489bc87c89433dd606a95f61ad574a5269a1095d2df5feb

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                  Filesize

                                                  851B

                                                  MD5

                                                  07ffbe5f24ca348723ff8c6c488abfb8

                                                  SHA1

                                                  6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                  SHA256

                                                  6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                  SHA512

                                                  7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                  Filesize

                                                  854B

                                                  MD5

                                                  4ec1df2da46182103d2ffc3b92d20ca5

                                                  SHA1

                                                  fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                  SHA256

                                                  6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                  SHA512

                                                  939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  d22073dea53e79d9b824f27ac5e9813e

                                                  SHA1

                                                  6d8a7281241248431a1571e6ddc55798b01fa961

                                                  SHA256

                                                  86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                  SHA512

                                                  97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  bffcefacce25cd03f3d5c9446ddb903d

                                                  SHA1

                                                  8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                  SHA256

                                                  23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                  SHA512

                                                  761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bb7d11bd-097a-44c6-a904-c0ebb6913438.tmp

                                                  Filesize

                                                  1B

                                                  MD5

                                                  5058f1af8388633f609cadb75a75dc9d

                                                  SHA1

                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                  SHA256

                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                  SHA512

                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f00a238d-e1df-4345-a26f-c153a34f6522.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  ca3d078e8e95f49b3f16b97453967bea

                                                  SHA1

                                                  8045d709bd2c2229fdb872d6055f10579d4c70ff

                                                  SHA256

                                                  6414976252bb7cdbc2756b2ce9aa5a0fda245ab2dd507065c98bdda03053d02d

                                                  SHA512

                                                  a739c7902b3b712b12f04768d7b9401a66ae6010b74165a89d77f0e20372469277944b1782a9f5497a54a65ec41c2f6c4f27f11b0635fcd2dec772483e137e87

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GRYMSCZU\download[1].htm

                                                  Filesize

                                                  1B

                                                  MD5

                                                  cfcd208495d565ef66e7dff9f98764da

                                                  SHA1

                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                  SHA256

                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                  SHA512

                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json

                                                  Filesize

                                                  19KB

                                                  MD5

                                                  fb2b9c3c07ac0fe823df9dad7a6e0013

                                                  SHA1

                                                  8fb68a95a00cb99887c9c77c30f9d363318aa845

                                                  SHA256

                                                  462d0193b940b48835af1c151c4650911f5695302ed8509a172b53821d72444a

                                                  SHA512

                                                  223de2893614941be53c35d1788fe484fe5d30eda2e32459ee65df77b638bd0ce605dedf46608c68213584ab004d6192fdb41dd732b4837f06103a678f8274b8

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  f209475a1eae0f628c8a720a0b7e571c

                                                  SHA1

                                                  b4f442503ebcfea79b809871820d50711e2437c8

                                                  SHA256

                                                  400e8fcb7f4b767e0abf3841de76b56c2c395cb554a41cb6780ee11a51a6b7b5

                                                  SHA512

                                                  306b546d9e9c0ded459ef31d48be0f062d2d72d1a01b597a08a351d8a046073a915cce64f66f96a7b5f58fbbce6f007c3dc285967c4af60d8dee6c4f63c960ea

                                                • C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe

                                                  Filesize

                                                  2.9MB

                                                  MD5

                                                  2ec142b97cf35b8089846aa53bb3bf63

                                                  SHA1

                                                  cdfbc2b54c132e32be48b41660ede419c586ba9b

                                                  SHA256

                                                  91aed4763f13b9fe40ac2ef9c5508a35aa689419f65a1d43ddb33b2c07e0e74b

                                                  SHA512

                                                  b11642f4f0a83aabb67603aedff479d0d714e4e5341ff159d5ee312dc437b5da94f5eaccc8dff6b63750ec60457148576b215f958db1c6cf2a06be3095e19fa4

                                                • C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  307ec3d2ef84340f318743d34a04b4bb

                                                  SHA1

                                                  abc5628413d938e1f67d3099b794b99ea63cc7ea

                                                  SHA256

                                                  c90090afba766ce459ba5b11acae8138202d0882c5834207397bef8cc439dd02

                                                  SHA512

                                                  cbb844bdb3243009182f0dae32dc2336c291ec13cfc3d0c4232751021a04b8afecfd3048229b01fd4c91c6b170768947c5a7cf78045b387efde7d7362194711b

                                                • C:\Users\Admin\AppData\Local\Temp\1009906001\d44a521567.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  71a0cb7b78f8fdfdf06de91776172b7a

                                                  SHA1

                                                  6b64e53d145e20aaf71e5e06a4612437aafc82aa

                                                  SHA256

                                                  30bfa77da2dd89468e0af222c2cbfdea864e98af82f67f5d4a5d728c60233091

                                                  SHA512

                                                  72875438cc3c7fff9b12c734ffce304e7cc49887e0f9d85630574837ee047e084d2f597933311ac92fcf83876cf9ddbb49660e90375d58651e69f1e3ff4c3eea

                                                • C:\Users\Admin\AppData\Local\Temp\1009911001\419ce7d55d.exe

                                                  Filesize

                                                  4.3MB

                                                  MD5

                                                  2ba6fe9428da32103bb44c955939208d

                                                  SHA1

                                                  145b071306f5ad32a9385ff9f89bae6a1ec968e9

                                                  SHA256

                                                  1d64908fcbd9560615576da2b9b41ce76fafb939a0f04f559301a1946db4e936

                                                  SHA512

                                                  044e8a36a5e03c9c406a4b3f2fdcd3057412875e1ebd4456aeb257bf622570826c665206d0ac5468ee6bf5b5642910a3c41a08cfdd7fc9c711561d31322854f0

                                                • C:\Users\Admin\AppData\Local\Temp\1009912001\b99315288a.exe

                                                  Filesize

                                                  4.2MB

                                                  MD5

                                                  0b55af827f58acea8620d659bd36e403

                                                  SHA1

                                                  b4003822554e2fe1692c70015008117e568fee63

                                                  SHA256

                                                  2079c5692d574fe0be41b7493a7dd3b455d2ab439ea7f0becc49c6584261e396

                                                  SHA512

                                                  580b484dd3828a932966668d797c5931c2b7cee6695008e853cdd657f43da867ba25ee2ac43b1193750a3028c09c875e75cbb8c1b6866994ebb8a06508d7ac95

                                                • C:\Users\Admin\AppData\Local\Temp\1009913001\7090e1c286.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  51ea9eba3a6b53b198dfa7a147c47cd9

                                                  SHA1

                                                  9b22b5e80434eaf5bdf287146f08033c9542a861

                                                  SHA256

                                                  cb8f34a0b29aa6c12f13a9dc9c3e4739c15716d002da7f74e6331c23358ec9d0

                                                  SHA512

                                                  308ba41ad69a0477a0cd44324efe69542119369252e485b19d1d2a28724bf801f3b58a723411c814a3deff72214e456c8649b8804f81512d159604ee13e9ce70

                                                • C:\Users\Admin\AppData\Local\Temp\1009914001\59819216b2.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  ca0ad971e610676ade1d3af832c47135

                                                  SHA1

                                                  ee9ed8a2f7c83cc8106f13c949b5ad134d16b0a5

                                                  SHA256

                                                  9b5e3da919a3b72949ab9fbfa36b987144e04cf5dab0c275d1afb2b843b4bca9

                                                  SHA512

                                                  c73aac179f75faaea20e8445b1a021fe8f11b11dc212b4863acafa1c5317c8ee4cd4e53bfa4f6a7467c2f0fe6c60313583a3a4d2b57613390609ae45435f4bb5

                                                • C:\Users\Admin\AppData\Local\Temp\1009915001\f60607129a.exe

                                                  Filesize

                                                  900KB

                                                  MD5

                                                  bf8d269035b4167dafb5dc98484d0a95

                                                  SHA1

                                                  5f1882a7292e257f64153292f57e7cda130b0981

                                                  SHA256

                                                  f29e94e7b7619ff3ef22b6853a4236f8d0d31a06c6fd65d09af5364d90284db6

                                                  SHA512

                                                  d29e465f4a8849ede157c5d1afb4e0bfebc3fd718ab9f0818eba96119b58864887966493225d411ab6eb6455aca2f473f3abba7e9bce32d78831f4cbdb38278e

                                                • C:\Users\Admin\AppData\Local\Temp\1009916001\c6adb9e885.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  00bed03140157c9cc1841c96a3d8cafd

                                                  SHA1

                                                  61758cac266f3682950b7712e5fdc618c1d4f88f

                                                  SHA256

                                                  1c89b25cdf12909417360f709e5d06f7b80c7a2dbf6fc8cfcb4e5fd1ba1e295f

                                                  SHA512

                                                  3f6f0dcfe00de0bda6cd08739fc50b3e1290635f28c122edcaa3c6c5bb5553a7c24311ec40c6275b6dee88ab98fd89af6c8a0535fa89fc352df33850ef8359b3

                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir4964_1610339226\CRX_INSTALL\_locales\en_CA\messages.json

                                                  Filesize

                                                  711B

                                                  MD5

                                                  558659936250e03cc14b60ebf648aa09

                                                  SHA1

                                                  32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                  SHA256

                                                  2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                  SHA512

                                                  1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir4964_1610339226\bc6ce642-c48f-4017-bd43-3382fbba60ad.tmp

                                                  Filesize

                                                  135KB

                                                  MD5

                                                  3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                  SHA1

                                                  9b73f46adfa1f4464929b408407e73d4535c6827

                                                  SHA256

                                                  19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                  SHA512

                                                  d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  09372174e83dbbf696ee732fd2e875bb

                                                  SHA1

                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                  SHA256

                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                  SHA512

                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  13.8MB

                                                  MD5

                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                  SHA1

                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                  SHA256

                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                  SHA512

                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  bca78b81d027a72cbbd98368f0deedfd

                                                  SHA1

                                                  9921675fdb62f800ca90c0f228dab2ab6b03fe8e

                                                  SHA256

                                                  3f3c51f977121f1e41ec826ede8c3f4818d1bae36e5a373d039c30b4303c2a56

                                                  SHA512

                                                  0e66dbe9335bf20a12c980d75471801628df5cc6ec9b2207140ab29aa926b9b45c8913babab1362a2bc7465b6a2ab1e44314280503fde3488c1c1adeb8c07db9

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  cc635872cae6c77b73a0b147b7653234

                                                  SHA1

                                                  3c9c68ef2acc044a232d8c4814d3f75ab4d60a56

                                                  SHA256

                                                  2dde97952b206de7036d81fb7b64dda6446ef547171ca69be2331dde90d35d25

                                                  SHA512

                                                  8528f35070469d4d6ff86e039c78203b8686930bff989dfc427a14a8db31f83b8bf49bec758eee9a316cfa4f223c898458f3cd4bcba52382f9c65ab54f6193d3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  c9b64e06a64bd1dd9d1f8dae3c0cde6c

                                                  SHA1

                                                  9c80e53dfca10198f848b887d09c9199d587e92f

                                                  SHA256

                                                  6b6b446c99a5b1fce58d4bf573554960906e40bca78df8799648c9879b1cf8f1

                                                  SHA512

                                                  1e2f0ea7c66fd1b7a9dcc91367fa3cac21f42a936c0015647ae4e5d0e0a526cd99dbfd7911b5d00ca4f7fb3ba8b6392612ddc57a74a627618aae21fde7acc11f

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  0c35f45b1883b1d3a94ac3ca8da32876

                                                  SHA1

                                                  4ec53a125736eef3d7b610ed67f556e77e2f8a6f

                                                  SHA256

                                                  64a4346b0ea894ff546f181eea294e93723193ac49d026c9798d591934271373

                                                  SHA512

                                                  1d6718fe721a7c64008f6fd0cf64c21edef7865d3fb1259fca79b7b20b8f5e4e5c9aae2764c1e43f7077f8f37e7da1d3cc9008c7f6c13d783eaf57f7a0ac49e5

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  4e599cad05ccf1765fccf3eff3a58cf4

                                                  SHA1

                                                  b51e5a21cb17a3ad514df82049dd425ce20a9727

                                                  SHA256

                                                  c94eee6a53f41afde346c2714c8700bd2576b79dbc83d216d2ca8be2e6b83158

                                                  SHA512

                                                  7a1662f748d5f6a7f69f090d37b3ea33575994f60a09e41455a87fc8c378f239bc26a0358fbb86ecc9cd608c8569993475f69036c6ab21bc6d901725ac3a9482

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  4448d58d3aac96078157f216a7bdae56

                                                  SHA1

                                                  87624de4230766576baa089f71daab12427b75f8

                                                  SHA256

                                                  a0d8c2577c649fd7453d03da50b92b058831124ed33f7cb5c4063e72d3a36eaa

                                                  SHA512

                                                  e4bc701e9a4d9f7df300c89e62ad3c050ef662249adc7e65a82d48ed23ea0212fefc9b304392ce34010af394e4021b66b0e977318bb5de4b3e1afc1eebf6dfd6

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\b7510b81-0fd4-47c7-b8c0-fd718f292199

                                                  Filesize

                                                  671B

                                                  MD5

                                                  b5bb1cbdc4697cb1b9d6e0c58ea5e185

                                                  SHA1

                                                  80b17fce598fc7cb8aa28f8dc12fcaab7c956166

                                                  SHA256

                                                  25bfbb9a57cf695839c63601534ff47f48ac59174a9421c357e31b4a0cc0f1f4

                                                  SHA512

                                                  2c31670c569fbb9b901efcb3fc4ecdfbd05e5c1e52dec2877df5f005192db3498cb73908041160fd841ee7e51941fb2f702d2e494f95300955bb2a4a8cbbd972

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\f03035e8-0a5e-4df5-8d2d-a34632afd6c4

                                                  Filesize

                                                  27KB

                                                  MD5

                                                  2960ea9dbf1c882fb00f32810eafbc76

                                                  SHA1

                                                  cd39fa98579b6183f13819a5d10061418dd76554

                                                  SHA256

                                                  29f5f4796cc96208de125948b1d593af65d916199287cd812dcf49d111c5039c

                                                  SHA512

                                                  469779ef7d92156584a0e9594313512a41b1bfccbf94e514a9a1c8cf35d098ca610b8ba4a3efa48d7a09ee14d96609763e2a4f287127fbdd3d7c856629769798

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\f14bde23-0ca1-4660-9b7f-f12363dc8c83

                                                  Filesize

                                                  982B

                                                  MD5

                                                  f7fba2b39c85e1b0dd39bee741c930aa

                                                  SHA1

                                                  970eb771818d91208bf80dc1d5c18df38846e55a

                                                  SHA256

                                                  972d79568351940096e6b95519bd05e73c9cf81b1f88134b95e073910503f8ad

                                                  SHA512

                                                  3a9bb3c0aa8e6a7bda4e25aecd9b9e7b0dde60670aea8901e0d80b46a9f3bd3d89990749fdd0f886844684edb20f2acd917a7abeefbb5b455761a19b07979ced

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  842039753bf41fa5e11b3a1383061a87

                                                  SHA1

                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                  SHA256

                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                  SHA512

                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                  SHA1

                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                  SHA256

                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                  SHA512

                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  bf957ad58b55f64219ab3f793e374316

                                                  SHA1

                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                  SHA256

                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                  SHA512

                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                  Filesize

                                                  17.8MB

                                                  MD5

                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                  SHA1

                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                  SHA256

                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                  SHA512

                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  cc5dd4305b03285186232ffc78eed7dc

                                                  SHA1

                                                  fafc832a7ac0081a8f1f3c3be4c544836a60aa2f

                                                  SHA256

                                                  66f5c017efc4e100dae68392b0be91a08d7b804f434074d76b8d6ca735c01324

                                                  SHA512

                                                  652aad47034f8704627b2a572b8b1dd75dc21fb20d5102fa78477b11e18265adabcc010ba6c2bcc8d81e5dab5e29d1b2949cdecd89756129b0eb01a9010c1fd7

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  71a9c5629ab5f29ac884afa73378734b

                                                  SHA1

                                                  232a250a47c6d946c76bae8252f2ae67c2e86936

                                                  SHA256

                                                  d1afda1afb0353e286e0054a1174b624acc36b3de4b73f6012f7ad263bcfc75c

                                                  SHA512

                                                  12a5b84222736a7c7ec2f33eb6cdc44ea5abcfa80e23b5a1e0f8c5df086d7b16e56ecdc09ab384b3edeb48becefa5cf26b6271bde1021f155b0678223350f3ce

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  c8d1f1e29167681227000e87fac2aa4f

                                                  SHA1

                                                  9b064a3f10583eccba38d9b6a080a1febe37d126

                                                  SHA256

                                                  032fba4a9bf2ceb4eb16ed18c7dae17ab04a9ed8e37c499447a7fd4d269977ca

                                                  SHA512

                                                  26d13463572b9a2e27a497be351480c5fb4fffec0404b42c50001750381cde4ad006e4c7d0821caea7f4e3bb44d1232cf25845044b4094acfa453f258ce6686a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  6ac347e62aa720e18ff4546d700a5e66

                                                  SHA1

                                                  e9f181d9546bcd670285640274994aa2c48e1c02

                                                  SHA256

                                                  83d909cfb88f65484b84b30657a68109c9f04f70e6e48336aa5b30747cedc21b

                                                  SHA512

                                                  1650ea99628708f61d324cc5c8b98c45d2e8873460620e40b46461843b207e17bb449ea52dca3b363be86ff736c1ff93228c496b2199e06fd2c69cd152f62c0d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  eab160030802cb04711b0f56487ad6cd

                                                  SHA1

                                                  4b17bd3ec65e4e8aae4f9bab9f340aec54e19db0

                                                  SHA256

                                                  f54ff30f4ac00eed059c6293d15b3999419efdbf633cd58559acc5d02babeef4

                                                  SHA512

                                                  e96467163020ade4640f694a9b0dbd6cbe666d0e71e37634c0c248aae6bb9b0c0f6be37d3c21e41385fa173ade26e29fc77f3a96602a5d91036966ffc8040921

                                                • C:\Users\Admin\DocumentsAEHIJDAFBK.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  9dea0e097a9267eec56e1d08e9f37554

                                                  SHA1

                                                  7e7f36a9c20b52830bc11b77b48814efbe7276e9

                                                  SHA256

                                                  ecdbc4f125db74bc0d489f0c3c4feb805225af49b02762f70c69f2dcb95e2751

                                                  SHA512

                                                  61a5284f0afc6637ef794dfcd761529aba1e72f46428e2363fe5f372e16ce34902edd97fe5b41e98ece99ef18a92aa9458e97e21454b904d92f1a7c345c236e7

                                                • memory/444-440-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-49-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-530-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-498-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-488-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-442-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-2-0x0000000000BC1000-0x0000000000BD8000-memory.dmp

                                                  Filesize

                                                  92KB

                                                • memory/444-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/444-3-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/444-1-0x0000000077854000-0x0000000077856000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/444-0-0x0000000000BC0000-0x000000000122B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/544-2399-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-1108-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-3297-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-1294-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-576-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-682-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-3599-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-3606-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-3609-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-544-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-1141-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/544-638-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1476-613-0x0000000000400000-0x00000000008CB000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1476-721-0x0000000000400000-0x00000000008CB000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1476-650-0x0000000000400000-0x00000000008CB000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1476-617-0x0000000010000000-0x000000001001C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/1476-1123-0x0000000000400000-0x00000000008CB000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/1476-1129-0x0000000000400000-0x00000000008CB000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2252-639-0x0000000000C60000-0x0000000000DCA000-memory.dmp

                                                  Filesize

                                                  1.4MB

                                                • memory/3976-636-0x0000000000890000-0x0000000001497000-memory.dmp

                                                  Filesize

                                                  12.0MB

                                                • memory/3976-641-0x0000000000890000-0x0000000001497000-memory.dmp

                                                  Filesize

                                                  12.0MB

                                                • memory/4008-679-0x0000000000970000-0x00000000015CA000-memory.dmp

                                                  Filesize

                                                  12.4MB

                                                • memory/4008-659-0x0000000000970000-0x00000000015CA000-memory.dmp

                                                  Filesize

                                                  12.4MB

                                                • memory/4160-563-0x00000250B0510000-0x00000250B07FC000-memory.dmp

                                                  Filesize

                                                  2.9MB

                                                • memory/4332-572-0x00000243EE6A0000-0x00000243EE7A6000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/4332-568-0x00000243D4050000-0x00000243D4060000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4352-543-0x0000000000620000-0x0000000000AD1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4352-529-0x0000000000620000-0x0000000000AD1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4584-597-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4584-596-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4832-701-0x0000000000C30000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/4832-699-0x0000000000C30000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/5064-681-0x0000000000950000-0x0000000000DF4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/5064-677-0x0000000000950000-0x0000000000DF4000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/5180-2627-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5180-2668-0x0000000000D20000-0x00000000011D1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5860-1140-0x0000000000810000-0x0000000000ACA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5860-1137-0x0000000000810000-0x0000000000ACA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5860-1003-0x0000000000810000-0x0000000000ACA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5860-1048-0x0000000000810000-0x0000000000ACA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5860-1047-0x0000000000810000-0x0000000000ACA000-memory.dmp

                                                  Filesize

                                                  2.7MB