Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 16:44

General

  • Target

    04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe

  • Size

    6.9MB

  • MD5

    fcc5c005c3ccbddee8bee4dc5ca441e2

  • SHA1

    d597f7ec6f9309af338b0bbb2234f9a0a5ca1a92

  • SHA256

    04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d

  • SHA512

    f9f2ac3fa052093f622989ae40bd4c06871853e507064fd92760b54e0e4973b0cc77339bf4dda99959c083bb34c2a557a701b8161cd16340a4f6fc8d3340ff3a

  • SSDEEP

    196608:qZjdOmZw7qclSdCdbM8evA0U4YJtJq8Y4KM:Ej1ZwOcniTA02Bl

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

https://classify-shed.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Power Settings 1 TTPs 4 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe
    "C:\Users\Admin\AppData\Local\Temp\04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4R43.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4R43.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0b81.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0b81.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17n3.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17n3.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4564
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1824
            • C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe
              "C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4412
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe
                7⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4644
            • C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe
              "C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3144
              • C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe
                "C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2280
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 1404
                  8⤵
                  • Program crash
                  PID:1924
            • C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe
              "C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2388
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 1384
                7⤵
                • Program crash
                PID:1172
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 1412
                7⤵
                • Program crash
                PID:6840
            • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe
              "C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4428
              • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe
                "C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5104
            • C:\Users\Admin\AppData\Local\Temp\1013469001\f26daf7d99.exe
              "C:\Users\Admin\AppData\Local\Temp\1013469001\f26daf7d99.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1376
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 1592
                7⤵
                • Program crash
                PID:1848
            • C:\Users\Admin\AppData\Local\Temp\1013470001\81714f8964.exe
              "C:\Users\Admin\AppData\Local\Temp\1013470001\81714f8964.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3264
            • C:\Users\Admin\AppData\Local\Temp\1013471001\bad0f0d4e8.exe
              "C:\Users\Admin\AppData\Local\Temp\1013471001\bad0f0d4e8.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:3052
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2368
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2084
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:832
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5084
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:732
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:836
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:316
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d9aefea-05bf-4b09-840c-2b52834f07ac} 316 "\\.\pipe\gecko-crash-server-pipe.316" gpu
                      9⤵
                        PID:4484
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2476 -prefMapHandle 2472 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {863d299f-3763-468b-9542-eaf11bba6155} 316 "\\.\pipe\gecko-crash-server-pipe.316" socket
                        9⤵
                          PID:3088
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3068 -prefMapHandle 3220 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53323f65-ef39-41d7-82e7-1825755fb726} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab
                          9⤵
                            PID:4940
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4108 -childID 2 -isForBrowser -prefsHandle 4100 -prefMapHandle 4056 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb8e39a0-465d-4d65-8df6-a0a409343666} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab
                            9⤵
                              PID:1968
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4568 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4688 -prefMapHandle 4684 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa515623-0297-4002-a80f-3c8a6f1d7fd1} 316 "\\.\pipe\gecko-crash-server-pipe.316" utility
                              9⤵
                              • Checks processor information in registry
                              PID:6012
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5048 -childID 3 -isForBrowser -prefsHandle 4608 -prefMapHandle 5000 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ff2149-8f6f-4268-98ac-0b7e930ce9ef} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab
                              9⤵
                                PID:7096
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5320 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2098bb3f-5c57-421d-9d44-26b543a96c61} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab
                                9⤵
                                  PID:7156
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5504 -childID 5 -isForBrowser -prefsHandle 5124 -prefMapHandle 5584 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9ad121e-a1fd-482b-b894-b35eee416d31} 316 "\\.\pipe\gecko-crash-server-pipe.316" tab
                                  9⤵
                                    PID:5308
                            • C:\Users\Admin\AppData\Local\Temp\1013472001\a984c64bc8.exe
                              "C:\Users\Admin\AppData\Local\Temp\1013472001\a984c64bc8.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1960
                            • C:\Users\Admin\AppData\Local\Temp\1013473001\b36aa0d711.exe
                              "C:\Users\Admin\AppData\Local\Temp\1013473001\b36aa0d711.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5212
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 1788
                                7⤵
                                • Program crash
                                PID:6328
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1013474041\2EW05w7.ps1"
                              6⤵
                              • Blocklisted process makes network request
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5736
                              • C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe
                                "C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: MapViewOfSection
                                PID:6208
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'
                                  8⤵
                                    PID:6404
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\WindowsSystem\WindowsSystem.exe','C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe'
                                      9⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6576
                                  • C:\Windows\explorer.exe
                                    "C:\Windows\explorer.exe"
                                    8⤵
                                    • Suspicious behavior: MapViewOfSection
                                    PID:6420
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                      9⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:7036
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit
                                        10⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2416
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'
                                          11⤵
                                          • System Location Discovery: System Language Discovery
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1624
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB91A.tmp.bat""
                                        10⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1372
                                        • C:\Windows\SysWOW64\timeout.exe
                                          timeout 3
                                          11⤵
                                          • System Location Discovery: System Language Discovery
                                          • Delays execution with timeout.exe
                                          PID:4516
                                        • C:\Users\Admin\AppData\Roaming\Wihnup.exe
                                          "C:\Users\Admin\AppData\Roaming\Wihnup.exe"
                                          11⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:456
                                    • C:\Windows\EXPLORER.EXE
                                      C:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}
                                      9⤵
                                        PID:4968
                                      • C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe
                                        "C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe" ""
                                        9⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6692
                                        • C:\Windows\system32\powercfg.exe
                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                          10⤵
                                          • Power Settings
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2264
                                        • C:\Windows\system32\powercfg.exe
                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                          10⤵
                                          • Power Settings
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4024
                                        • C:\Windows\system32\powercfg.exe
                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                          10⤵
                                          • Power Settings
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1900
                                        • C:\Windows\system32\powercfg.exe
                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                          10⤵
                                          • Power Settings
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2324
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          10⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:1412
                                      • C:\Windows\EXPLORER.EXE
                                        C:\Windows\EXPLORER.EXE {DF4EE2DA-C20C-4BBF-97D5-4B94E23FE1C8}
                                        9⤵
                                          PID:6716
                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U9131.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U9131.exe
                                4⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:448
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 1588
                                  5⤵
                                  • Program crash
                                  PID:4324
                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w55K.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w55K.exe
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3388
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U637G.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U637G.exe
                            2⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1680
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1848
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 448 -ip 448
                          1⤵
                            PID:3148
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2280 -ip 2280
                            1⤵
                              PID:724
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1376 -ip 1376
                              1⤵
                                PID:1568
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2388 -ip 2388
                                1⤵
                                  PID:4320
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2388 -ip 2388
                                  1⤵
                                    PID:4192
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6568
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5212 -ip 5212
                                    1⤵
                                      PID:5872
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4976

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\WindowsSystem1\WindosCPUsystem.exe

                                      Filesize

                                      2.8MB

                                      MD5

                                      56ec5472231866630749ccf6977c4fbd

                                      SHA1

                                      03c5fe2e0dd49a554b354e7ef26f794f4aa86e9d

                                      SHA256

                                      e19905020c9685a68c3f4c9f62f57e4b21bc8dcfad567c89b0b37b42a120182b

                                      SHA512

                                      46274dfec96406c4bd101c6207c813e03b965e9f9a6b1b57147bcfb7d24a9180002c3b8001ac85a91dfd0b75f0aabba119e455d52fa847a751c32f00e3ad4753

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OIPZWEW8\download[1].htm

                                      Filesize

                                      1B

                                      MD5

                                      cfcd208495d565ef66e7dff9f98764da

                                      SHA1

                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                      SHA256

                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                      SHA512

                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      19KB

                                      MD5

                                      a97c902d5c004e4655b7b3c1c8c8105c

                                      SHA1

                                      6de53259e42a05269c4680ded500d226ac0e51a8

                                      SHA256

                                      77b98e4f6c294a9c42f339514949b6261aa9a6fac0ee100d91748715eeaea8a4

                                      SHA512

                                      7f2b6f05e69a9b7256804046dd654b4597232811fe3ecbd785eb16f4f5344c439de003847ef246311d37220eab22b0c8c6da171665a17baf708c72c4e6c5ca9d

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                                      Filesize

                                      19KB

                                      MD5

                                      db0bf7ed4ccec0de379e469ef86853ff

                                      SHA1

                                      a61e45ad66b759853cabecbf77c797421c7729bf

                                      SHA256

                                      91304250795424d9e676e9cd9ed3a16dd1bb2f4725978168f751737b970a7674

                                      SHA512

                                      07f4e7be56630a8ca91708b75953ab7d2c6cfb05e5a822d9ef394349167a2373e9f90f35b5de88e0ea7f7a1092dcecbbcc39a2b9119830091156f6d821109970

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                      Filesize

                                      15KB

                                      MD5

                                      96c542dec016d9ec1ecc4dddfcbaac66

                                      SHA1

                                      6199f7648bb744efa58acf7b96fee85d938389e4

                                      SHA256

                                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                      SHA512

                                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                    • C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe

                                      Filesize

                                      2.2MB

                                      MD5

                                      3541c1ac26eb5bbb87f01c20fd9f8824

                                      SHA1

                                      bf5d136c911491f59bdeb3bf37b8f1a155fd3a97

                                      SHA256

                                      b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1

                                      SHA512

                                      babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93

                                    • C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe

                                      Filesize

                                      809KB

                                      MD5

                                      ec31a091e3c06294cade73a10d5cae88

                                      SHA1

                                      0eadea9ac15955c791ad35ebb2719fb632ce0197

                                      SHA256

                                      23f46ec28302b106fa23d1db2a513875c7157b803cf32f4f3f94e51ed4ba2d83

                                      SHA512

                                      827499e195dfea6bbbcd3e92dff81dab77d32418eaa9438fe66d6c35df2c7736b5842afb83e892a2f1c84e8fba1b53f3f300a1b9ed465ecbf2cb55b6544cc328

                                    • C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe

                                      Filesize

                                      2.5MB

                                      MD5

                                      2a78ce9f3872f5e591d643459cabe476

                                      SHA1

                                      9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                      SHA256

                                      21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                      SHA512

                                      03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                    • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe

                                      Filesize

                                      9.9MB

                                      MD5

                                      53306653e88891da35bdfc1330a2dafd

                                      SHA1

                                      0870df54ca24e32bf88ccf00d7dd0ada3a0ea096

                                      SHA256

                                      fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09

                                      SHA512

                                      930ff27fc7377eaf0097cc6430f2c5486336c398a7ae08fadbcb0af62490b96c0b9ec3d36455c04e5a79d2405fc0c6f1f6a44b0298f3b6ff46f2a6c591aa51ba

                                    • C:\Users\Admin\AppData\Local\Temp\1013469001\f26daf7d99.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      fc730cc04cea274ba94c95faad570950

                                      SHA1

                                      9959c1e33b3fe4f3e4da5e033f97a39004518b7d

                                      SHA256

                                      478b4646887cf4961943568f8aef881f2991e0fffaf5d2592939724c6a8c2d78

                                      SHA512

                                      5eb3af384e548e3ae02a1a0b972394b6a4b40798df44e379d50dd251c1f61eccc0d90460f966de2c3868ed9b521daae7e59c1eef449b02e884ffb96b408a7281

                                    • C:\Users\Admin\AppData\Local\Temp\1013470001\81714f8964.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      be752df2a3bae5d9fbd14d433b351967

                                      SHA1

                                      64355c823c38b257e469ff717c5ba8a9e0b0bbf2

                                      SHA256

                                      08570ded4cf2c4a1d44b1837436d241c0392f3c9f35ff96da78ffc80dcdcf0fc

                                      SHA512

                                      600cb7a8e7832f70909f53ea387c850d8a8b7e255d80f7049ff4833b198ae18cb817460e2343ff92021935c17d4845caa88ecf4ecbad8b832083d6f0fd83b151

                                    • C:\Users\Admin\AppData\Local\Temp\1013471001\bad0f0d4e8.exe

                                      Filesize

                                      948KB

                                      MD5

                                      20f205ebc3ddeec636e52a437b8c3c9b

                                      SHA1

                                      a7d0319411c2b8d115b5fb02f1ef63a37c7ea55f

                                      SHA256

                                      d1f20d134a92d23683fc218749a27d327a9ac6a35cdcde8bded0854bc05ab3e8

                                      SHA512

                                      2a7880884aabb5a5cd1677455c38f50d6e97d7ffe11688673f683c76031725fe068acfc0f530bd3d1d574d721566ef9308431595b09cff17840a294b5b19afcb

                                    • C:\Users\Admin\AppData\Local\Temp\1013472001\a984c64bc8.exe

                                      Filesize

                                      2.7MB

                                      MD5

                                      43c842910f45deae72a62e0819adceb0

                                      SHA1

                                      fffcc762a5d4753855e62bd845ad39e43c962097

                                      SHA256

                                      aedb1af233367d2b3facb397055713f112e2fd833e625f07fff1ae723ebc4fb8

                                      SHA512

                                      c9fca70038e11e562e613d13061e2b68c378ee16bddf7341ca81e3502e07f31d01431f8acb39d35d43444115d96a0ace52d81d352ccbddbbe66773f64cc73fc0

                                    • C:\Users\Admin\AppData\Local\Temp\1013473001\b36aa0d711.exe

                                      Filesize

                                      1.9MB

                                      MD5

                                      e96cd9e1c8cbc927c9c445e155d5bd75

                                      SHA1

                                      6c8d7a80cb4635fda0f7b799ace942dcd10b3700

                                      SHA256

                                      9f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6

                                      SHA512

                                      419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413

                                    • C:\Users\Admin\AppData\Local\Temp\1013474041\2EW05w7.ps1

                                      Filesize

                                      8KB

                                      MD5

                                      de8938735aac7e7328ab07101836c2e8

                                      SHA1

                                      1109c9d099e5caa3fdb90c4e45622aaa1d9fa7e3

                                      SHA256

                                      2a772aefe91cd03f252ecfd3f1141a75506dd52f41c584fb754ba66f0a7accb9

                                      SHA512

                                      b78b4217ff3e01b998c4c884f10d0bdeeac41b373826b428304587f4929ccff2379f8884aa00e9aa6b9149eaf062009266a6c5fd3792bcb25b4fcaba2597b71c

                                    • C:\Users\Admin\AppData\Local\Temp\DATABASE

                                      Filesize

                                      48KB

                                      MD5

                                      349e6eb110e34a08924d92f6b334801d

                                      SHA1

                                      bdfb289daff51890cc71697b6322aa4b35ec9169

                                      SHA256

                                      c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                      SHA512

                                      2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U637G.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      99cff6034a2010e18f19281afa021aec

                                      SHA1

                                      6b045ce6bc1d26d244c083dbc4381c1d38539700

                                      SHA256

                                      bda24b571a92286e33963d7790a6cada3b23b2d5b8c4099eb7f4922d41df113e

                                      SHA512

                                      eed961481c0678c7777e79d5d9fd3fad71d6af44fa74a704018ce5dd5290945fd28e5220ffc8b6ab8aca5497d2dd9f8f062f61ffc9a8e77aec62d525f1dc41f2

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4R43.exe

                                      Filesize

                                      5.3MB

                                      MD5

                                      777d6a67707876286fe17d655c830ebf

                                      SHA1

                                      79867f542222556a1e256d800495f471d0c958f0

                                      SHA256

                                      4280ed645ef5b31060f54161c295196fc3ea72407fc1c466f43d21a96ffb133b

                                      SHA512

                                      3824620a7fbf59927bf61ed4cb0844a97e94e2f3d8c768b2530eea4b957212d81cb8364f7b1ce5e01f1c980f396bcd9df079ace9fc1bfeeec55f0a2c39167dd1

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w55K.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      82b70cb96dc208843a0380d75ff08f9b

                                      SHA1

                                      d6d8eeabc5868e73a39ff5c9fd86270bda3a48b5

                                      SHA256

                                      697d7f31a1d5adab597902ceb9228a77b6e84d776be1f49a610b04de25d87801

                                      SHA512

                                      7c33eb7aea7854aade6aa7c94b1ac5fde978e57904dd344bd4405edd6d7652d8c28cd3075c87e37306a89d333a740f7552d7f4ccdc42c0d64a008449b5bdd39d

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe

                                      Filesize

                                      2.3MB

                                      MD5

                                      ffabcc262fb699998b6191d7656c8805

                                      SHA1

                                      fd3ea79a8550b14e9cc75fb831fd7a141964a714

                                      SHA256

                                      f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde

                                      SHA512

                                      79b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0b81.exe

                                      Filesize

                                      3.5MB

                                      MD5

                                      dec11b3cc0ee1492fbf2c3f8f5e21497

                                      SHA1

                                      0fbe6977002f563e309b75e36a89db3a33060254

                                      SHA256

                                      9223019e435ac3deb348e7ae211abe23c5f7bbccc4d2b9765a5cd1b7be82c06b

                                      SHA512

                                      c569ef71e1738da249b0efb35542f414392e7c3a620f4b7ca4f42498a32a2f87b5b1d39eb41b866ff6660f32082fe09c5b2d6bfe31ea73b8831b9370336dc04f

                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J17n3.exe

                                      Filesize

                                      3.1MB

                                      MD5

                                      11c23f104d7ecfcb5b535f22214c5dbe

                                      SHA1

                                      0899ffd81ea3727de16614c5f9e84749f8182552

                                      SHA256

                                      c5741977022e908fbe2c233df25c5d5c6b0b88af01a026acc6085f30793708ef

                                      SHA512

                                      eca9bf13c3f03db9508a83dc3abef5268a9fcd8ffc3307a832fd871196dfc4e09bc1c1416ff5f66c49b153cad22c22e14bd7eb3da11ba848641d88a984764388

                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U9131.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      ffbf4dac7f1ed0ade66186644f98132c

                                      SHA1

                                      dfb1a1993b0de0922174dce31e80df9508cd162a

                                      SHA256

                                      ea3d6a813bfa00a6fe5888fdb841e24063e24bf7723ac233df33d1e07129e23c

                                      SHA512

                                      7bdcbdc172e4b7fc1d1d072f3258e4a5144b065d4b2d327bca306eada4f70bca5fd9ee603b3e1d1f4c98b298e4032bcd83dfbf9eb2b85b5abce649769645e856

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\VCRUNTIME140.dll

                                      Filesize

                                      94KB

                                      MD5

                                      a87575e7cf8967e481241f13940ee4f7

                                      SHA1

                                      879098b8a353a39e16c79e6479195d43ce98629e

                                      SHA256

                                      ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                                      SHA512

                                      e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\_bz2.pyd

                                      Filesize

                                      78KB

                                      MD5

                                      bcf0d58a4c415072dae95db0c5cc7db3

                                      SHA1

                                      8ce298b7729c3771391a0decd82ab4ae8028c057

                                      SHA256

                                      d7faf016ef85fdbb6636f74fc17afc245530b1676ec56fc2cc756fe41cd7bf5a

                                      SHA512

                                      c54d76e50f49249c4e80fc6ce03a5fdec0a79d2ff0880c2fc57d43227a1388869e8f7c3f133ef8760441964da0bf3fc23ef8d3c3e72ce1659d40e8912cb3e9bc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\_ctypes.pyd

                                      Filesize

                                      116KB

                                      MD5

                                      41a9708af86ae3ebc358e182f67b0fb2

                                      SHA1

                                      accab901e2746f7da03fab8301f81a737b6cc180

                                      SHA256

                                      0bd4ed11f2fb097f235b62eb26a00c0cb16815bbf90ab29f191af823a9fed8cf

                                      SHA512

                                      835f9aa33fdfbb096c31f8ac9a50db9fac35918fc78bce03dae55ea917f738a41f01aee4234a5a91ffa5bdbbd8e529399205592eb0cae3224552c35c098b7843

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\_lzma.pyd

                                      Filesize

                                      150KB

                                      MD5

                                      ba3797d77b4b1f3b089a73c39277b343

                                      SHA1

                                      364a052731cfe40994c6fef4c51519f7546cd0b1

                                      SHA256

                                      f904b02720b6498634fc045e3cc2a21c04505c6be81626fe99bdb7c12cc26dc6

                                      SHA512

                                      5688ae25405ae8c5491898c678402c7a62ec966a8ec77891d9fd397805a5cfcf02d7ae8e2aa27377d65e6ce05b34a7ffdedf3942a091741af0d5bce41628bf7d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\_socket.pyd

                                      Filesize

                                      73KB

                                      MD5

                                      79c2ff05157ef4ba0a940d1c427c404e

                                      SHA1

                                      17da75d598deaa480cdd43e282398e860763297b

                                      SHA256

                                      f3e0e2f3e70ab142e7ce1a4d551c5623a3317fb398d359e3bd8e26d21847f707

                                      SHA512

                                      f91fc9c65818e74ddc08bbe1ccea49f5f60d6979bc27e1cdb2ef40c2c8a957bd3be7aea5036394abab52d51895290d245fd5c9f84cc3cc554597ae6f85c149e1

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\base_library.zip

                                      Filesize

                                      812KB

                                      MD5

                                      ab6d3149a35e6baddf630cdcefe0dab5

                                      SHA1

                                      44cdb197e8e549a503f6cfcb867a83bf2214d01c

                                      SHA256

                                      1d91fa604893531393f83e03e68eb97d2c14c2d957ed33877d2b27b7c30ce059

                                      SHA512

                                      28a882e86d92d42ff983b68445cc90431c2b65b7ec3abbffb5585a9750d67b8b52a1361e20d4d80ca4a30b927fe543a2e9c9a65c1846e42a112b511ddc59545a

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\libffi-7.dll

                                      Filesize

                                      32KB

                                      MD5

                                      eef7981412be8ea459064d3090f4b3aa

                                      SHA1

                                      c60da4830ce27afc234b3c3014c583f7f0a5a925

                                      SHA256

                                      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                      SHA512

                                      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\pyexpat.pyd

                                      Filesize

                                      187KB

                                      MD5

                                      f3630fa0ca9cb85bfc865d00ef71f0aa

                                      SHA1

                                      f176fdb823417abeb54daed210cf0ba3b6e02769

                                      SHA256

                                      ac1dfb6cdeeadbc386dbd1afdda4d25ba5b9b43a47c97302830d95e2a7f2d056

                                      SHA512

                                      b8472a69000108d462940f4d2b5a611e00d630df1f8d6041be4f7b05a9fd9f8e8aa5de5fe880323569ac1b6857a09b7b9d27b3268d2a83a81007d94a8b8da0ff

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\python310.dll

                                      Filesize

                                      4.2MB

                                      MD5

                                      c6c37b848273e2509a7b25abe8bf2410

                                      SHA1

                                      b27cfbd31336da1e9b1f90e8f649a27154411d03

                                      SHA256

                                      b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8

                                      SHA512

                                      222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI44282\select.pyd

                                      Filesize

                                      25KB

                                      MD5

                                      431464c4813ed60fbf15a8bf77b0e0ce

                                      SHA1

                                      9825f6a8898e38c7a7ddc6f0d4b017449fb54794

                                      SHA256

                                      1f56df23a36132f1e5be4484582c73081516bee67c25ef79beee01180c04c7f0

                                      SHA512

                                      53175384699a7bb3b93467065992753b73d8f3a09e95e301a1a0386c6a1224fa9ed8fa42c99c1ffbcfa6377b6129e3db96e23750e7f23b4130af77d14ac504a0

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ke4fdjl3.pik.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\downloaded_file.exe

                                      Filesize

                                      503KB

                                      MD5

                                      d60c9e070239f8c240aaa6d8832e11ef

                                      SHA1

                                      aaac23a338a91505c56c3057d22a14bf190a2795

                                      SHA256

                                      493f1bd7227c4ee9430f8ad226e929908996b97a28f578a850e9b26c393ad2d2

                                      SHA512

                                      d70cf79dec352bd965f8506ad989375642a8931300d5497724c82882ae4d57ccc314d4e6b24c398075af3deb4433207522106647e70e74c90e56791e20bca42c

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      479KB

                                      MD5

                                      09372174e83dbbf696ee732fd2e875bb

                                      SHA1

                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                      SHA256

                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                      SHA512

                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                      Filesize

                                      13.8MB

                                      MD5

                                      0a8747a2ac9ac08ae9508f36c6d75692

                                      SHA1

                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                      SHA256

                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                      SHA512

                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                      Filesize

                                      6KB

                                      MD5

                                      57d85827375b6fb4621ec8f7e9b76115

                                      SHA1

                                      6db283a24bed9b7e2eb49ab3ad368bf75d989803

                                      SHA256

                                      ef0cb85921b80347aa30f9fc1e72589ae4ef615ed225e8a483fdaa58b4be827a

                                      SHA512

                                      169e468491500a7faf09fbf6097db4dcdbe2cedd71e8c6b378761382e71b433119a2e400255a96b77739961c4358cf2924cf8e0d1e6366e279e6311d26adae44

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                      Filesize

                                      8KB

                                      MD5

                                      77a00b06618d30d98d5bf6a6661860e7

                                      SHA1

                                      580ab168d9c5b0aaf03a5bfd134edf2070552ed8

                                      SHA256

                                      36623f0220c3418c62dfb67c1edfe0e24d52209f9c283c8713844cc810fdf706

                                      SHA512

                                      e325f21394046e458a82bded8935405263dfade1f16132e14892a32f65da2a92007f25351ee7b27f866531489018b01fbb0dd35f93f9e1ebfb7c5cf159405c69

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                      Filesize

                                      13KB

                                      MD5

                                      97349bb8f41086d870dadd726f5df74e

                                      SHA1

                                      7e144041f7eae5267e87b9e25914f4f939c02dee

                                      SHA256

                                      a19539429a6a85f79fbc0e7c852956c1e1a963ac05ba8c5397fb368bd1ab0de0

                                      SHA512

                                      ce679450baab44f3a677aaecc690b0390d3d82889d1bfd258ec11df6dc594bf3f141ec5122f962b60e94e55f25891e241aa5373baab63bf6a0356c0d3f7de8c3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                      Filesize

                                      17KB

                                      MD5

                                      d690fd559879268a562109eaaec0f356

                                      SHA1

                                      64c40992c5edfdaa14b60ee9703ad7a3589eef2c

                                      SHA256

                                      333163e40c34e52c4cc50bcb15a22a37093b87ec6bd21b29c6f6afa74ef59261

                                      SHA512

                                      62f761564fe217bcbc40fd414932b88e0316d9a3c8d93ad19fb4038dd1252bad21c2706226085f487bca81a935901e0fdb1cf781c693983a02b2f997353e2127

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cert9.db

                                      Filesize

                                      224KB

                                      MD5

                                      a4495aedd32846b57e47797abcc8a720

                                      SHA1

                                      90b6f1d6dbc9465d3cc02bddcd4c229db9d09fdf

                                      SHA256

                                      9cf52be45100779024b89cb1a09774b618ee5834599cd876024f5009914de830

                                      SHA512

                                      feb888c922b59f48eec1fb53e9f8f08e9df7e701d0625faa30354026b277fad241a97a4352b1f88efa23679e8139115daceea5f9ff1c4676f4dcb1c1d26fbf8e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                                      Filesize

                                      27KB

                                      MD5

                                      c0e887dbdd8f4b184ae2cbf7b040d04b

                                      SHA1

                                      88052490d5fdb087a8f08f45d64b485efe8a9082

                                      SHA256

                                      788a0940f8895b58281e59e147d0374738c4b97900e29d08e22359c0a45a45f2

                                      SHA512

                                      d44038b723b8e420a9484336c2c92b1127f143327c5720c03659f7b95c47dc89328e88950d3b76e96701436f9446cdcaf22bdad5abdeed72253cdfa9056bb442

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                                      Filesize

                                      23KB

                                      MD5

                                      e0a005d0df8bf0cc1454be2cffda068d

                                      SHA1

                                      be17760638e25e450115fab21ee6ce2ff88f15ce

                                      SHA256

                                      cad50561d0928ab28f5a771a3198d4f052a8dd8f7f466e6e9b5a156125a8bb33

                                      SHA512

                                      95e670d57dbc481251db8b40d42770e7ede132f803424602f8ecfeab066b083286426bdfc6afdce9d532b8074e0c5d2e379c20fa539f6d92db8eb118384539af

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                                      Filesize

                                      6KB

                                      MD5

                                      dd16dca2fd89cc0b81f45e2fc21e872f

                                      SHA1

                                      b7d61835e1dabf1369aa75c473026b4958ac8fec

                                      SHA256

                                      53899aaf12667dda30a23544a142dd0b042561e8483e676313b9b6a7dd5e680d

                                      SHA512

                                      135d3bc65de0a664cf9f7a46c5ed336636df92662e3734226358ded858c0883ec1e6589ee992a7ead8f6ddd5f1b7600878aa0bab956fdcc48ac4da562ef38669

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      28KB

                                      MD5

                                      0c9bfac62231ce7ca93dc1d723942bbb

                                      SHA1

                                      f37bc4e9e3c43a62fae6544fd4911f01f0245e95

                                      SHA256

                                      70a25ef640ffe32867caba12a72f79e9fa642e9fe357ca8b2dfaccd4c2a87e5b

                                      SHA512

                                      0e90a95601fcf687ee8900cef3136274b05e15452c788d01a9dc303a9e7c191a582f5eff15f9be6641b1495238fd7a5007de50d32368db99a7cd0c570b985c11

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      6KB

                                      MD5

                                      b81a82642b8575050352abcf49b7a819

                                      SHA1

                                      5a8dcd88a092f6a87f4ea020bb0b10fce0232b73

                                      SHA256

                                      b472f6dddba9c3e7ba5c0ccb0cdf5260af81dd99690bfa2d5f85111bde26f47d

                                      SHA512

                                      49e66e55069f423447cadb3b3b0d840a923b0c375a2e4e3d8607739d5c322a4af3e8459eaa60ee53a287af5b39fec7bee4862c2c79b5ccc2030ead6488e635a9

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      165f1150b36c8bca694ebbaf2833f01d

                                      SHA1

                                      2e11f8c8c32a6a2d01c788c0871b9c5ee1a39ea5

                                      SHA256

                                      bcc2d8dab50ecb75a75adee942de783e572e8529e36e29cfbfb1cfa5d72695d6

                                      SHA512

                                      9d1eb2eac182786f38370e0f5227fdeb582609747048f14da6589d87c7222dd5a153e907b6688ab6753ac52578ddb9d669ff1280d328ca9953799ac6ca0e0ccb

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\537086e5-b844-4797-b49e-fa6a312133b0

                                      Filesize

                                      671B

                                      MD5

                                      33a66d3f43d5b8ab54ab5192fe9fdb8f

                                      SHA1

                                      80e7ff11fd21a6cccf5e34279a670b786df571af

                                      SHA256

                                      05ddbf9973a5b49c56b7a3ebd4bd6d9af5ca49dafbee18ceddd7f04c3a556f46

                                      SHA512

                                      010943a5afdadfd0f760c43f1f8815d7c5d4b2ab70fd34467d3f3e1bc35c272ea1e00d83857090b2de69a1265c87ce95472a3158c6e674c2fa5dd97e463f9bae

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\7902d730-3ded-4ecf-be8d-05e1ef2243d3

                                      Filesize

                                      982B

                                      MD5

                                      dacf629ad5ba4fe9d6aa6f5c3023eeeb

                                      SHA1

                                      2cd47e3dfa86701c097823f84312f0db1ef20fc1

                                      SHA256

                                      cc0868342f4e65d26b90e486003758fcf1914b3b1c4771f4d87841978557feed

                                      SHA512

                                      a35210855f4453c349065311bb28f816da0c3c9080ee16d0993cb3e856f33c5b3c2ef13dc268be7f1e0a00f1c03bf8d8a65dfd0f11178de0eacdeeb368f54af0

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f8b1ce02-b84f-4aec-9207-dfa2efd4bb17

                                      Filesize

                                      25KB

                                      MD5

                                      a899a7eba8a77c693f89e5ca8e84c90d

                                      SHA1

                                      afb11f8fa2786343994a6f23fbb6ead62519c9ae

                                      SHA256

                                      874eaed1ea07f6e0c526bc4806b20e2494f4fdff61a1489252cdc6c5b7ee8d2f

                                      SHA512

                                      e90215b00ed9ce6b73155672d149f75fdb23b2db8280ce6186b6afc73f134f130f828c97606e68fc4620b8526d9ae4fa245ecf3a44f8ade6627d3f441ae16203

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      842039753bf41fa5e11b3a1383061a87

                                      SHA1

                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                      SHA256

                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                      SHA512

                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      2a461e9eb87fd1955cea740a3444ee7a

                                      SHA1

                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                      SHA256

                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                      SHA512

                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      bf957ad58b55f64219ab3f793e374316

                                      SHA1

                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                      SHA256

                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                      SHA512

                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                      Filesize

                                      17.8MB

                                      MD5

                                      daf7ef3acccab478aaa7d6dc1c60f865

                                      SHA1

                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                      SHA256

                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                      SHA512

                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                      Filesize

                                      12KB

                                      MD5

                                      57208dfe32ee0dbd035764592c080d6d

                                      SHA1

                                      da4129738ecd3c113447c7842d8b9b3027130fda

                                      SHA256

                                      e32f66b2f1347f32f6276ce9fe17723d6a44aa2dcab17361647f47d44dd78e26

                                      SHA512

                                      f9938c4f200dcb75a77940eef966ba28affca5e496d71c00aa408768c19d6d6b8840ebdce296d9c7a9fd379ecd5bd098e5b3dad12f5bb18c6a32e5d87e102e96

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                      Filesize

                                      10KB

                                      MD5

                                      f636b6115d9cf48cb6dc86fe559e15ba

                                      SHA1

                                      370f8381aafaefc905477c7063014d0c96192eb6

                                      SHA256

                                      330ccb32e40727f467d879452c2ae3ebc795139227f8e60461e42664b2f96029

                                      SHA512

                                      b8535c6735eb219761581ef5d43229e203cbcd973429f694982c0965ad5ba0052c92b220902d1ca02e6deaa9fc309790ecb365d11afc6eaee6c4ede5395ffb3f

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                      Filesize

                                      11KB

                                      MD5

                                      9162af81ab542f7dd7e72c62e83fe3bf

                                      SHA1

                                      b24baef64d48dca9c3f07b48aa366496329940c7

                                      SHA256

                                      52545ef017c294709ac5f647f6f291040dd00d71a0640c156b2193b4dca6584a

                                      SHA512

                                      fe85e35fee74ec879024f96dff3793ab2bb984d9b5ca1941d3f065a87d41ad2a26caa12a274fea31f113f4c9188f86bd39744a5697480b497f344bbb15c9a50f

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                      Filesize

                                      10KB

                                      MD5

                                      d8446acf44996d13fafa271247732417

                                      SHA1

                                      6d55f34ccbbaccea86e78537d62bdce5ee3f30e1

                                      SHA256

                                      80326da046df5e44a922c24b4a94afc9f9707410c3bde784b76e55cd7e0bdcd8

                                      SHA512

                                      2973df8026ca77c38926469790d0c72936ddce1488281828946f398b6d0c890591ec76d88b2b3c5da9874d6335b70ce2ae5fae8d55255fd497d75ac8824a6b1f

                                    • memory/448-39-0x0000000000760000-0x0000000000BDE000-memory.dmp

                                      Filesize

                                      4.5MB

                                    • memory/448-45-0x0000000000760000-0x0000000000BDE000-memory.dmp

                                      Filesize

                                      4.5MB

                                    • memory/456-2440-0x0000000004BD0000-0x0000000004D2A000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/456-2438-0x00000000001E0000-0x0000000000220000-memory.dmp

                                      Filesize

                                      256KB

                                    • memory/456-2439-0x00000000023C0000-0x00000000023DA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/1376-1444-0x00000000003E0000-0x0000000000896000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1376-1446-0x00000000003E0000-0x0000000000896000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1680-56-0x0000000000F70000-0x000000000121E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1680-55-0x0000000000F70000-0x000000000121E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1680-53-0x0000000000F70000-0x000000000121E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1680-1308-0x0000000000F70000-0x000000000121E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1680-1305-0x0000000000F70000-0x000000000121E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1824-81-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1824-33-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1848-43-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1848-41-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1960-1510-0x0000000000CE0000-0x0000000000FA6000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/1960-1508-0x0000000000CE0000-0x0000000000FA6000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/1960-2329-0x0000000000CE0000-0x0000000000FA6000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/1960-1509-0x0000000000CE0000-0x0000000000FA6000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/1960-2325-0x0000000000CE0000-0x0000000000FA6000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/3264-1462-0x0000000000D40000-0x00000000013CE000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/3264-1464-0x0000000000D40000-0x00000000013CE000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/3388-49-0x00000000003A0000-0x0000000000A39000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/3388-50-0x00000000003A0000-0x0000000000A39000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/4564-35-0x0000000000D10000-0x0000000001026000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/4564-21-0x0000000000D10000-0x0000000001026000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/4644-126-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-84-0x0000000005510000-0x00000000055A2000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/4644-1284-0x0000000005470000-0x00000000054BC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/4644-85-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-102-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-106-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-86-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-90-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-92-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-96-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-99-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-80-0x00000000006C0000-0x000000000091E000-memory.dmp

                                      Filesize

                                      2.4MB

                                    • memory/4644-100-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-104-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-122-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-120-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-128-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-82-0x0000000005270000-0x000000000546E000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-83-0x0000000005A20000-0x0000000005FC4000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/4644-124-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-108-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-89-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-94-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-144-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-142-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-140-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-110-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-113-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-1283-0x0000000005750000-0x00000000058BE000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/4644-114-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-138-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-136-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-116-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-134-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-132-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-118-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-130-0x0000000005270000-0x0000000005468000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4644-2392-0x0000000005660000-0x00000000056B4000-memory.dmp

                                      Filesize

                                      336KB

                                    • memory/4976-2652-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/4976-2654-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/5212-2339-0x0000000000400000-0x0000000000C67000-memory.dmp

                                      Filesize

                                      8.4MB

                                    • memory/5212-2560-0x0000000000400000-0x0000000000C67000-memory.dmp

                                      Filesize

                                      8.4MB

                                    • memory/5212-2218-0x0000000000400000-0x0000000000C67000-memory.dmp

                                      Filesize

                                      8.4MB

                                    • memory/5736-2304-0x0000000006560000-0x00000000065AC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/5736-2303-0x0000000006520000-0x000000000653E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/5736-2346-0x0000000007B20000-0x0000000007B42000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/5736-2345-0x0000000008270000-0x0000000008306000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/5736-2309-0x0000000006AD0000-0x0000000006AEA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/5736-2308-0x0000000007B50000-0x00000000081CA000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/5736-2288-0x0000000002C00000-0x0000000002C36000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/5736-2289-0x0000000005640000-0x0000000005C68000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/5736-2302-0x0000000005F00000-0x0000000006254000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/5736-2291-0x0000000005E20000-0x0000000005E86000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/5736-2292-0x0000000005E90000-0x0000000005EF6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/5736-2290-0x0000000005550000-0x0000000005572000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/6568-2373-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/6568-2389-0x0000000000100000-0x0000000000416000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/6576-2387-0x00000239E0260000-0x00000239E0282000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/7036-2398-0x0000000000400000-0x0000000000704000-memory.dmp

                                      Filesize

                                      3.0MB