Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 16:56

General

  • Target

    4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe

  • Size

    1.8MB

  • MD5

    6e62c424734a15da271aeb9057391fa4

  • SHA1

    14c50350a560be190aa3caf909dbc31e502f382b

  • SHA256

    4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f

  • SHA512

    09f9d9f03504fad822d6ca0affcdb21acfa4f4be1100a4e79f1f3d1b767dbc03a4cc95e677d99eaf316ec6e712f144d2d1ca46fdf1972b6c1c987869db4a5819

  • SSDEEP

    24576:ffDq11zp2lwp22w+IUezEIFIrI7mWY566oY1cZgGMRPQee+6MqLmhX+ZyFZZw8DX:DMzp2qNw+Li+rMSLPGMqeSMDhVZw8Dk

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8009002136:AAHPJrz2-Pn7ZXvJ8icMhaRHpwMHWNcOutY/sendDocumen

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 16 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 13 IoCs
  • Modifies registry class 37 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3444
      • C:\Users\Admin\AppData\Local\Temp\4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe
        "C:\Users\Admin\AppData\Local\Temp\4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe
            "C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1612
          • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe
            "C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\SYSTEM32\attrib.exe
              attrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
              5⤵
              • Views/modifies file attributes
              PID:1040
            • C:\Windows\SYSTEM32\attrib.exe
              attrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
              5⤵
              • Views/modifies file attributes
              PID:1560
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2800
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell ping 127.0.0.1; del DU1zDwm.exe
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2380
              • C:\Windows\system32\PING.EXE
                "C:\Windows\system32\PING.EXE" 127.0.0.1
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:1868
          • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe
            "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1184
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd" /c wmic path win32_videocontroller get caption
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:5308
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path win32_videocontroller get caption
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5444
            • C:\Windows\SYSTEM32\dxdiag.exe
              "dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
              5⤵
              • Drops file in System32 directory
              • Checks SCSI registry key(s)
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:5656
            • C:\Windows\SYSTEM32\taskkill.exe
              "taskkill" /F /IM chrome.exe
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:964
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=16490 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox
              5⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:5940
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5bbccc40,0x7fff5bbccc4c,0x7fff5bbccc58
                6⤵
                  PID:3960
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1760,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2044 /prefetch:2
                  6⤵
                    PID:2068
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1880,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1756 /prefetch:3
                    6⤵
                      PID:5004
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2092,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:8
                      6⤵
                        PID:1828
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16490 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2880,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2896 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:5236
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16490 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2900,i,12647853354658439909,15065597193414750251,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2932 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:5164
                    • C:\Windows\SYSTEM32\taskkill.exe
                      "taskkill" /F /IM msedge.exe
                      5⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5856
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=13329 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox
                      5⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      PID:4696
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff574e46f8,0x7fff574e4708,0x7fff574e4718
                        6⤵
                          PID:2252
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2040 /prefetch:2
                          6⤵
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6068
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2140 /prefetch:3
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4396
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2464 /prefetch:8
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5820
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1084
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2860
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:5916
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=13329 --field-trial-handle=1932,5022005490460288847,531260112280618802,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5736
                      • C:\Windows\SYSTEM32\cmd.exe
                        "cmd.exe" /C taskkill /F /IM firefox.exe
                        5⤵
                          PID:5000
                          • C:\Windows\system32\taskkill.exe
                            taskkill /F /IM firefox.exe
                            6⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5412
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd.exe" /C taskkill /F /IM Firefox.exe
                          5⤵
                            PID:1220
                            • C:\Windows\system32\taskkill.exe
                              taskkill /F /IM Firefox.exe
                              6⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4356
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /C taskkill /F /IM Firefox.exe
                            5⤵
                              PID:1560
                              • C:\Windows\system32\taskkill.exe
                                taskkill /F /IM Firefox.exe
                                6⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1792
                            • C:\Windows\SYSTEM32\cmd.exe
                              "cmd.exe" /C taskkill /F /IM firefox.exe
                              5⤵
                                PID:3464
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /F /IM firefox.exe
                                  6⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:940
                              • C:\Windows\SYSTEM32\cmd.exe
                                "cmd.exe" /C taskkill /F /IM Firefox.exe
                                5⤵
                                  PID:880
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /F /IM Firefox.exe
                                    6⤵
                                    • Kills process with taskkill
                                    PID:1588
                                • C:\Windows\SYSTEM32\cmd.exe
                                  "cmd.exe" /C taskkill /F /IM Firefox.exe
                                  5⤵
                                    PID:3508
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /F /IM Firefox.exe
                                      6⤵
                                      • Kills process with taskkill
                                      PID:964
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
                                    5⤵
                                      PID:5040
                                      • C:\Windows\system32\choice.exe
                                        choice /C Y /N /D Y /T 1
                                        6⤵
                                          PID:6036
                                    • C:\Users\Admin\AppData\Local\Temp\1011357001\e54c0ca980.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011357001\e54c0ca980.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:6080
                                    • C:\Users\Admin\AppData\Local\Temp\1011358001\a3cd05bc71.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011358001\a3cd05bc71.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5868
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 1568
                                        5⤵
                                        • Program crash
                                        PID:5876
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 1540
                                        5⤵
                                        • Program crash
                                        PID:5044
                                    • C:\Users\Admin\AppData\Local\Temp\1011359001\3cd1b439d4.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011359001\3cd1b439d4.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3768
                                    • C:\Users\Admin\AppData\Local\Temp\1011360001\2757ec8910.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011360001\2757ec8910.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:5732
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        PID:4292
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM chrome.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        PID:5660
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM msedge.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        PID:2112
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM opera.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        PID:5772
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM brave.exe /T
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        PID:2500
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                          PID:848
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                            6⤵
                                            • Checks processor information in registry
                                            • Modifies registry class
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1536
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ac6743c-5659-434e-ba2e-d0e1d98e2b0d} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" gpu
                                              7⤵
                                                PID:4552
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c49ba048-add9-499f-ada4-d339ee05efa7} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" socket
                                                7⤵
                                                  PID:732
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2980 -childID 1 -isForBrowser -prefsHandle 1572 -prefMapHandle 3016 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9319cecc-f992-411c-9c68-6a863c719267} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab
                                                  7⤵
                                                    PID:4276
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -childID 2 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd60ea84-e35b-4e55-b990-83737e23767d} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab
                                                    7⤵
                                                      PID:5544
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4820 -prefMapHandle 4816 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4573d436-ba58-4030-b5eb-7d17ca0ad62f} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" utility
                                                      7⤵
                                                      • Checks processor information in registry
                                                      PID:5368
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 3 -isForBrowser -prefsHandle 5500 -prefMapHandle 5520 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {167b7fe7-70f0-4f85-91b2-d6e655e393da} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab
                                                      7⤵
                                                        PID:5148
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 4 -isForBrowser -prefsHandle 5184 -prefMapHandle 5496 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55cac189-46dd-4ce7-b757-ad8b48fa9900} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab
                                                        7⤵
                                                          PID:892
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5708 -childID 5 -isForBrowser -prefsHandle 5868 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13cb0d2d-9fd1-4680-947c-2dc041bf99a0} 1536 "\\.\pipe\gecko-crash-server-pipe.1536" tab
                                                          7⤵
                                                            PID:1144
                                                    • C:\Users\Admin\AppData\Local\Temp\1011361001\0478d63882.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1011361001\0478d63882.exe"
                                                      4⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5740
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1792
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2256
                                              • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of WriteProcessMemory
                                                PID:512
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:6140
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                  2⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1280
                                                  • C:\Windows\system32\PING.EXE
                                                    "C:\Windows\system32\PING.EXE" 127.1.0.1
                                                    3⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:5504
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:5460
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5868 -ip 5868
                                                  1⤵
                                                    PID:5436
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5868 -ip 5868
                                                    1⤵
                                                      PID:5488
                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:3368
                                                    • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                      C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:5972
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        2⤵
                                                          PID:4452
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                          2⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          PID:636
                                                          • C:\Windows\system32\PING.EXE
                                                            "C:\Windows\system32\PING.EXE" 127.1.0.1
                                                            3⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:3712
                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:2372
                                                      • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                        C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        PID:5436
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          2⤵
                                                            PID:5112
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                            2⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            PID:4536
                                                            • C:\Windows\system32\PING.EXE
                                                              "C:\Windows\system32\PING.EXE" 127.1.0.1
                                                              3⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:912

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          6cf293cb4d80be23433eecf74ddb5503

                                                          SHA1

                                                          24fe4752df102c2ef492954d6b046cb5512ad408

                                                          SHA256

                                                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                          SHA512

                                                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          61cef8e38cd95bf003f5fdd1dc37dae1

                                                          SHA1

                                                          11f2f79ecb349344c143eea9a0fed41891a3467f

                                                          SHA256

                                                          ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                                          SHA512

                                                          6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          0a9dc42e4013fc47438e96d24beb8eff

                                                          SHA1

                                                          806ab26d7eae031a58484188a7eb1adab06457fc

                                                          SHA256

                                                          58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                                          SHA512

                                                          868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          3db79a11964191aa88b88cc82175e4e7

                                                          SHA1

                                                          46ad99139602e83840bf1e1f29274a0f52772ffa

                                                          SHA256

                                                          56e91a9a90780652e4ab7171c1d3bfbe0fa419caca43a563ed09c827ad20a2a6

                                                          SHA512

                                                          070339a0a372502e727c7b832c914482cfc4739b8e9674dcb2c432f63ffbb7f46e9c040ff1f3940c337d39e1bac655b0bb0a3c9599ca329d668a2e1e9f62575a

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          88be3bc8a7f90e3953298c0fdbec4d72

                                                          SHA1

                                                          f4969784ad421cc80ef45608727aacd0f6bf2e4b

                                                          SHA256

                                                          533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a

                                                          SHA512

                                                          4fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          7dcba3af848bba2d3e10b43e176546c5

                                                          SHA1

                                                          00bbf6d95f1fd4a59cb92b06ba9650709255425e

                                                          SHA256

                                                          1e302e5ee0b204058b401366b3130444ea08034e429010cb8a915159d0d606ec

                                                          SHA512

                                                          a274902b0b0392bfc29e98505d0e512defef9193b6ce26f543cb69ce77522f76af6fc62ec21ff6d857bcb5c9972797874318368d4cb09f2023821e8039f7ca1b

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          d61ae193cb25e288c7d74abfffcca905

                                                          SHA1

                                                          8eb32a9857f49547ea7f091c4d438cbbdf357e0a

                                                          SHA256

                                                          ab09778715b7d7d304c1efac67a8056c42f2b16a15cbd3e0a72b2226139fb1ab

                                                          SHA512

                                                          1f2dcab80cefaf28d543a4280a111ba5ed87fb94a307f72ba8547346d119f6f9f277055a469ef11e013b0fc50de70d2fc985b6bf8d8ad5a15c6c08adc47dcfec

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json

                                                          Filesize

                                                          19KB

                                                          MD5

                                                          e29c168914b612cb557483b1e9548d04

                                                          SHA1

                                                          d3c57b0da3a720f49bcece2fc55eb54b59db2fbf

                                                          SHA256

                                                          44d08e319d0c4150ef1d20f63e432a42bc618a65d2af1ba502aabc7cbdad5d41

                                                          SHA512

                                                          1de7b4ed730a81dfde4c8a4353f5b88750d942309be0c8bcbfc874299409c8435aa4c488bd5aa595e042a72d65aca40a6615986fd5c50082ef54d7954debe3f5

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                          Filesize

                                                          13KB

                                                          MD5

                                                          60df7fd05dc0c9f393f221c44bda4d0e

                                                          SHA1

                                                          c4dbac67a5535a5460cc8ba06153dc3d4b34245e

                                                          SHA256

                                                          19a985df54ef3657338fc960a52f5c7e80f72e99b23034567352bd915289f177

                                                          SHA512

                                                          1eba8dcecc79524f597e678894632939fc7b04a4e59655cc10b0db0557fa80e94a2445f294ca5f841fd436a2e8038373303f787c72ac29e43d5e8920063e0e52

                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                          Filesize

                                                          13KB

                                                          MD5

                                                          17d71502bf84ec09dd4ccd4e449029f4

                                                          SHA1

                                                          d73a6426b778ed33f6aa3d2f224dc53e6f9eed3e

                                                          SHA256

                                                          22e9a0b09574f35fbed140b3737e1b3c0580cf3a0d5b85a079397e949e962ef7

                                                          SHA512

                                                          86a51fabad86bcbd600dca83ad191c01f243fe14bd687188c5d77a276b8c0e5c638bf522af247c43bdb9af298d18f7767c2f317867b66e3004b6f999daf1cdaf

                                                        • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe

                                                          Filesize

                                                          1.5MB

                                                          MD5

                                                          03933b44701e2688a19b6fe5980526b7

                                                          SHA1

                                                          456f586dffa20cc847b3a1f86c2fc958e9cea325

                                                          SHA256

                                                          04510f9d11f433e48517273b05f3f800d73c16bca0b2b4a9afdaf3612550239e

                                                          SHA512

                                                          bb1e6d2e1ffc8ab728295ac07512db3f6a08e0c7f9ec70e65ec75591bb9f697781d0df2096d7f9fc9a4b60b62d427acef46bd9105d713a84f91d33db3bec5d96

                                                        • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe

                                                          Filesize

                                                          2.2MB

                                                          MD5

                                                          4c64aec6c5d6a5c50d80decb119b3c78

                                                          SHA1

                                                          bc97a13e661537be68863667480829e12187a1d7

                                                          SHA256

                                                          75c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253

                                                          SHA512

                                                          9054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76

                                                        • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe

                                                          Filesize

                                                          560KB

                                                          MD5

                                                          197feb829312be2d9505c1492b6ddd16

                                                          SHA1

                                                          4e521c36e4fd6c7755d93f8281cc028a980b0979

                                                          SHA256

                                                          2a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12

                                                          SHA512

                                                          fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9

                                                        • C:\Users\Admin\AppData\Local\Temp\1011357001\e54c0ca980.exe

                                                          Filesize

                                                          1.9MB

                                                          MD5

                                                          972aeaccbec56da479e178a53d3b24ff

                                                          SHA1

                                                          af7d676bf5c59c2ac6cfaaaaad067ed34090e675

                                                          SHA256

                                                          c4a071a267dabdb052c37972911874070424f210cd7f3aa6e33cf4e08efbd87d

                                                          SHA512

                                                          53599df300461312f499a4c8ef303724d74417b5d26a9cf189a35dcf6a76d0aa686c8341af6e50c35182d769c2223407cf9076878fbaf52e0f6c2933dff319e1

                                                        • C:\Users\Admin\AppData\Local\Temp\1011358001\a3cd05bc71.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          b3e050ed821da21358b0ede9caaa0072

                                                          SHA1

                                                          0cf01c23e9cbbe1439e9ed775e84ff8dfe801c80

                                                          SHA256

                                                          0312a298b39354700296f5ab5647989d876219e199092fa78229c1280a06cee0

                                                          SHA512

                                                          3c09a26a84d2b5fec4c0e9bfc65bae503888a4cfa10017a2539970dcdcac05536717cbb65942746dd0eb84d26743f7ad470261d52accc2900ee9f4f7602f20ba

                                                        • C:\Users\Admin\AppData\Local\Temp\1011359001\3cd1b439d4.exe

                                                          Filesize

                                                          1.7MB

                                                          MD5

                                                          9387e037e8c807c8447c95073b13b0a6

                                                          SHA1

                                                          5e954c6df3299b5857f00ce05c710aa35aa185b4

                                                          SHA256

                                                          db04aa6bb0f101f37ab6a726f553ebc59f5b45a44f8e60c78f09c678fa47ad9e

                                                          SHA512

                                                          ec11b76ef4604833b4aaf696d666f674445dcf6cae86ff903c780e6f4ebb5c7703388d032618bff69abe502459ef99f696ba2759f346ba79cb85cff2ad70dd54

                                                        • C:\Users\Admin\AppData\Local\Temp\1011360001\2757ec8910.exe

                                                          Filesize

                                                          947KB

                                                          MD5

                                                          41389a16e01cec68238b31986d5a0c14

                                                          SHA1

                                                          32047c6fde259dcb4ad6a0d89de7341ff32084b8

                                                          SHA256

                                                          5963ea20d6c1b8712092547a62280ffe4e83f0768841f8d18bdaaa097250ed94

                                                          SHA512

                                                          ea2eaccfc7d907c7741b3e0efab559a77e42ed04446f0f05fa457902d5fbd35b531f3f08db1c4e831c48bbc9baa6a900a0d211c6d8fd84420ec1a9f5a84a77be

                                                        • C:\Users\Admin\AppData\Local\Temp\1011361001\0478d63882.exe

                                                          Filesize

                                                          2.6MB

                                                          MD5

                                                          23d8fedbfa886da9a9da6074862df31e

                                                          SHA1

                                                          605e9b0ed6a4706a8e6b0af909dfd0caefee23eb

                                                          SHA256

                                                          83e05c86c86df81686dea5838d918c70a12026639b80dda9c93f6492442dd408

                                                          SHA512

                                                          b1b5d5cc05f7a08d9fb9293eb5885cfed349d590184ad38b415e05f5cff874c3591365a9c21405ff0941fe41c9c1dc580b89dece15f3174d7e99d72514151c0c

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0plproko.ml5.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                          Filesize

                                                          1.8MB

                                                          MD5

                                                          6e62c424734a15da271aeb9057391fa4

                                                          SHA1

                                                          14c50350a560be190aa3caf909dbc31e502f382b

                                                          SHA256

                                                          4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f

                                                          SHA512

                                                          09f9d9f03504fad822d6ca0affcdb21acfa4f4be1100a4e79f1f3d1b767dbc03a4cc95e677d99eaf316ec6e712f144d2d1ca46fdf1972b6c1c987869db4a5819

                                                        • C:\Users\Admin\AppData\Local\Temp\dxdiag.txt

                                                          Filesize

                                                          86KB

                                                          MD5

                                                          ef55e75c40b2f4e0575009c97addd196

                                                          SHA1

                                                          f60817822d4d08864053b70f9f867de3905767fe

                                                          SHA256

                                                          c5d6ab9f23433e3fb01d21d52391020189fd4ea788286700aedd94099d67d7d9

                                                          SHA512

                                                          41cfc15386d27f038c884d8b730271a3e45cfe8fcad15f58c120f48db814af62826d89efa3d2ea330aad8adf34221929d53ed2cff9aa54b9e45f6d9b10a0b1e4

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                          Filesize

                                                          479KB

                                                          MD5

                                                          09372174e83dbbf696ee732fd2e875bb

                                                          SHA1

                                                          ba360186ba650a769f9303f48b7200fb5eaccee1

                                                          SHA256

                                                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                          SHA512

                                                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                          Filesize

                                                          13.8MB

                                                          MD5

                                                          0a8747a2ac9ac08ae9508f36c6d75692

                                                          SHA1

                                                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                          SHA256

                                                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                          SHA512

                                                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          cb731f11071ae01c55840a229b104742

                                                          SHA1

                                                          033e8cd6a384f91b55d8791d8d81b6319d02ea63

                                                          SHA256

                                                          8aad0a8ab1836c576ce5e2de9898bca0d2a3c43954529bf830907ee1a8dba631

                                                          SHA512

                                                          7daa563276eba4e134033a572bcef9df599b910e0ac7eda0cb2161bb5bb8a9fb52bd65164479073b9c646a0cea3efd9fe4ad0a79cbf36194682b1c4465057a97

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                                                          Filesize

                                                          8KB

                                                          MD5

                                                          a128ee5a2d5f5cca9c278a6883ba3246

                                                          SHA1

                                                          a35e3ba3466c0235e011de97913a735ff4e8fae5

                                                          SHA256

                                                          8407ee4dec9047daaf8cda2ce03f63fd08cfafffc7efd912f3c6acc22e7d50cc

                                                          SHA512

                                                          f1a64d2a2a3360a7dc57d7e5fda09bbf1ef505fb50a299be4fb8da1d7239c9cac4bf711307dc8189c8969954d5085120fd094fd084c14677521e1a347b6d3aa5

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          f8408ba42a81cc0750557bd2a3bae499

                                                          SHA1

                                                          fbe979dc0054e507156cdc581b33bcd6164d7e7b

                                                          SHA256

                                                          c3528757fbc3a6f767bff3eca39c452a698eb7c9f5d3773009e284e47d88a18a

                                                          SHA512

                                                          3059d7b4aaddf521df48c749a209433b546711816bd80d25e56a9cb2e114d133c56c7cc6a784083fbb2757338f7e3fac523f60d19e0fb65a54b4475216bb4a37

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          ca7bff6e6c55a80b637b624686e7927b

                                                          SHA1

                                                          ebf6fa985138deb7f78371b96e71546dd04e6dda

                                                          SHA256

                                                          d8ff36d9295c8d6660f68880f8e23af3c74a2988fd7309fc89fc642e27aafa6d

                                                          SHA512

                                                          85b7426e89a77ccb085433e64e3f561f9735b95369ab19d698859498ed195a33d93d6f38e734e6ddd3308fd011186504ba41df23721eddae5a89aae428d70ca4

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          3d3f60a5145be17f956ba770fd9f93e2

                                                          SHA1

                                                          200514bf7c58ae59bc26f79ec1fa18feed5e2f7d

                                                          SHA256

                                                          b57a92c884178da369ca0d69b9b379690fdd76584ef4d30ec5480c0ffdc7c680

                                                          SHA512

                                                          5b7036a30134983b557c370a0d4406b4ecdf7cb7c4e5f4e5e844ab9ebf118ccebded6f40e9d4f9400ae1b5f69d47b685d96ee3f975b66eb20bfb0239288fe6da

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\356eba49-2a40-4f9b-a562-903982f3bd5d

                                                          Filesize

                                                          671B

                                                          MD5

                                                          41db001aa4ab66a3de88c30da33759f7

                                                          SHA1

                                                          056bf1d09bb59c1b71f7a8d2bedecdef1eb034a2

                                                          SHA256

                                                          13cb65472655b396f0dea5b64d4333bc275f31043724f1e06bd13f9e7a8c11c6

                                                          SHA512

                                                          0edd74ce359fbcb406fcfd485bf0c6a6213a534b5d7a64940137de0d4304ea9e4a05e4e01a501345eadab3319722af5c3a7cdb85e18f4bf1f76ab6805cb488fa

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\4e6a94a5-a8a3-482e-aafe-b03a31bd4fcc

                                                          Filesize

                                                          23KB

                                                          MD5

                                                          33f310d9b2f0dbce00245a6f5e566df8

                                                          SHA1

                                                          978e8d41355c82b39211f65d57926e711cf84884

                                                          SHA256

                                                          76b19040d8c580077328ce0da1a39a9b8ad23a5302d855575a4fa001cca57db1

                                                          SHA512

                                                          e715d7dc5c411864f4ad5f6770ac5fe3aefdf9edf79f678a6168104a35f81ccf29de84c7b277315ad4b6c769ce456616861085f05a7e26f84d74900a56a1466e

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\93210437-7ba9-482a-a7fb-2eb6fa088b65

                                                          Filesize

                                                          982B

                                                          MD5

                                                          ee4c42a47af3fed81c7ff49c59851dc7

                                                          SHA1

                                                          b41de3ce2f017cf9e09b89e71ddc68b9ff02cb7c

                                                          SHA256

                                                          e3b93c7c1df791038770ee3a07bde915aa377fdcd34b6b8b90f56f7179f7b913

                                                          SHA512

                                                          41ffa2575fd87b2587fa7510fe0de908f2cfbe2d17dd137ad8a797afdb86680b5e5aea2295df2d663aa7150052517b82c6cd2558c05e2c3d33a91d6616779c27

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                          Filesize

                                                          1.1MB

                                                          MD5

                                                          842039753bf41fa5e11b3a1383061a87

                                                          SHA1

                                                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                          SHA256

                                                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                          SHA512

                                                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                          Filesize

                                                          116B

                                                          MD5

                                                          2a461e9eb87fd1955cea740a3444ee7a

                                                          SHA1

                                                          b10755914c713f5a4677494dbe8a686ed458c3c5

                                                          SHA256

                                                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                          SHA512

                                                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                          Filesize

                                                          372B

                                                          MD5

                                                          bf957ad58b55f64219ab3f793e374316

                                                          SHA1

                                                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                          SHA256

                                                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                          SHA512

                                                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                          Filesize

                                                          17.8MB

                                                          MD5

                                                          daf7ef3acccab478aaa7d6dc1c60f865

                                                          SHA1

                                                          f8246162b97ce4a945feced27b6ea114366ff2ad

                                                          SHA256

                                                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                          SHA512

                                                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          a65047cfd7c30089e8bb1b70c5011f07

                                                          SHA1

                                                          a6e3052faaaf49217cfb31d784abc516d4239657

                                                          SHA256

                                                          bf167587b3253ecc6a7147af121d083d41477c227ed2c2563ce0adfaf33d6c42

                                                          SHA512

                                                          2a285104a4f5ec7be351856bfcc53227d36917e3e4ff72719371e432ba2299abf0b859c35619cbb7374978ea43339119e24ec5913e5dc09c33eccc3da5f89592

                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          f67b205513b8ba745b854e2a4ed17f69

                                                          SHA1

                                                          1a36afdf6eabdc7b3e441feec499336a26d4d78d

                                                          SHA256

                                                          2ae884871bc9f3025f052225bc25823fc1c75ae6d68c7ce7766846a75699e77e

                                                          SHA512

                                                          4414e058c425c23b7bd5b51def370a3ff7d8c2b33d74d92e0c986441286fbea82614f0804e693b261a8dc33b90191cc526ce2116013f6b84acd07d1c253e1177

                                                        • memory/1184-3538-0x000001944ED30000-0x000001944ED3A000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/1184-3349-0x00000194343E0000-0x0000019434472000-memory.dmp

                                                          Filesize

                                                          584KB

                                                        • memory/1184-3539-0x000001944ED60000-0x000001944ED72000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/1184-3483-0x000001944ED20000-0x000001944ED28000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/1184-3482-0x000001944EA00000-0x000001944EA0A000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/1184-3481-0x000001944ECD0000-0x000001944ECE6000-memory.dmp

                                                          Filesize

                                                          88KB

                                                        • memory/1184-3468-0x000001944EDB0000-0x000001944EDBA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/1184-3410-0x000001944ECF0000-0x000001944ED0E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/1184-3355-0x000001944EA10000-0x000001944EA86000-memory.dmp

                                                          Filesize

                                                          472KB

                                                        • memory/1184-3354-0x000001944E970000-0x000001944E98E000-memory.dmp

                                                          Filesize

                                                          120KB

                                                        • memory/1184-3353-0x000001944E940000-0x000001944E948000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/1184-3352-0x000001944E930000-0x000001944E93A000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/1184-3351-0x0000019436080000-0x00000194360A6000-memory.dmp

                                                          Filesize

                                                          152KB

                                                        • memory/1184-3350-0x000001944E890000-0x000001944E930000-memory.dmp

                                                          Filesize

                                                          640KB

                                                        • memory/1612-45-0x0000000005880000-0x00000000059C4000-memory.dmp

                                                          Filesize

                                                          1.3MB

                                                        • memory/1612-85-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-1227-0x0000000005B70000-0x0000000005BBC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/1612-40-0x00000000733DE000-0x00000000733DF000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/1612-1229-0x0000000006450000-0x00000000064A4000-memory.dmp

                                                          Filesize

                                                          336KB

                                                        • memory/1612-41-0x0000000000BE0000-0x0000000000D6C000-memory.dmp

                                                          Filesize

                                                          1.5MB

                                                        • memory/1612-42-0x0000000005C80000-0x0000000006224000-memory.dmp

                                                          Filesize

                                                          5.6MB

                                                        • memory/1612-61-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-43-0x0000000005610000-0x00000000056A2000-memory.dmp

                                                          Filesize

                                                          584KB

                                                        • memory/1612-44-0x00000000056E0000-0x00000000056EA000-memory.dmp

                                                          Filesize

                                                          40KB

                                                        • memory/1612-63-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-59-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-65-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-46-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-51-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-101-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-103-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-97-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-105-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-107-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-67-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-99-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-95-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-93-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-77-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-55-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-91-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-71-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-73-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-89-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-69-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-75-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-87-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-47-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-49-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-53-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-79-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-81-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-83-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1612-1226-0x0000000006290000-0x0000000006346000-memory.dmp

                                                          Filesize

                                                          728KB

                                                        • memory/1612-57-0x0000000005880000-0x00000000059BF000-memory.dmp

                                                          Filesize

                                                          1.2MB

                                                        • memory/1792-1236-0x0000000005000000-0x0000000005098000-memory.dmp

                                                          Filesize

                                                          608KB

                                                        • memory/1792-1235-0x0000000000400000-0x000000000046E000-memory.dmp

                                                          Filesize

                                                          440KB

                                                        • memory/1792-3318-0x0000000005330000-0x0000000005396000-memory.dmp

                                                          Filesize

                                                          408KB

                                                        • memory/1792-3317-0x0000000002AD0000-0x0000000002AFC000-memory.dmp

                                                          Filesize

                                                          176KB

                                                        • memory/2256-3407-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2256-3405-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2372-6391-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2380-3329-0x00000289CD2D0000-0x00000289CD2F2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/2624-1-0x00000000777C4000-0x00000000777C6000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/2624-3-0x0000000000910000-0x0000000000DC4000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2624-2-0x0000000000911000-0x000000000093F000-memory.dmp

                                                          Filesize

                                                          184KB

                                                        • memory/2624-4-0x0000000000910000-0x0000000000DC4000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2624-18-0x0000000000910000-0x0000000000DC4000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/2624-0-0x0000000000910000-0x0000000000DC4000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3368-5749-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3368-5707-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/3768-3527-0x0000000000770000-0x0000000000DF5000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/3768-3532-0x0000000000770000-0x0000000000DF5000-memory.dmp

                                                          Filesize

                                                          6.5MB

                                                        • memory/4244-177-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4244-276-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4244-773-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4244-16-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4244-19-0x0000000000291000-0x00000000002BF000-memory.dmp

                                                          Filesize

                                                          184KB

                                                        • memory/4244-1228-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4244-21-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/4244-20-0x0000000000290000-0x0000000000744000-memory.dmp

                                                          Filesize

                                                          4.7MB

                                                        • memory/5740-3940-0x0000000000C00000-0x0000000000EAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/5740-3939-0x0000000000C00000-0x0000000000EAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/5740-3941-0x0000000000C00000-0x0000000000EAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/5740-3964-0x0000000000C00000-0x0000000000EAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/5740-3967-0x0000000000C00000-0x0000000000EAC000-memory.dmp

                                                          Filesize

                                                          2.7MB

                                                        • memory/5868-3920-0x0000000000260000-0x0000000000701000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/5868-3530-0x0000000000260000-0x0000000000701000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/5868-3466-0x0000000000260000-0x0000000000701000-memory.dmp

                                                          Filesize

                                                          4.6MB

                                                        • memory/6080-3403-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                          Filesize

                                                          8.5MB

                                                        • memory/6080-3479-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                          Filesize

                                                          8.5MB