Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 11:10

General

  • Target

    6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe

  • Size

    2.9MB

  • MD5

    dac73e7813dc3500e5f677b5f31191df

  • SHA1

    bf5eaa68905a19d7cda4cc824267d5fbfc27785a

  • SHA256

    6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e

  • SHA512

    7e26aa8fa617887d322ff823d6133dc677cd6c7e5ff2d1b14f6db689dff185e4f668802037bcd38e2134965892f71aabb4b274ae5568adb6e2ad065f93d593ba

  • SSDEEP

    49152:CdKtEEZolFDH6eU4kCfdnZlAVVXmZUiUHHUw0aAVP:ntEEZuFDaeU4kCfhZloXmVy0

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 55 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe
    "C:\Users\Admin\AppData\Local\Temp\6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e_Sigmanly.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3336
      • C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe
        "C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe
          "C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1668
      • C:\Users\Admin\AppData\Local\Temp\1018471001\3638cfc73c.exe
        "C:\Users\Admin\AppData\Local\Temp\1018471001\3638cfc73c.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\onismephiz"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4952
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4828
        • C:\onismephiz\a69515003e0643aeb56a1cdbfc2c2295.exe
          "C:\onismephiz\a69515003e0643aeb56a1cdbfc2c2295.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:116
      • C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe
        "C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe
          "C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:996
      • C:\Users\Admin\AppData\Local\Temp\1018473001\5d6ab90cc5.exe
        "C:\Users\Admin\AppData\Local\Temp\1018473001\5d6ab90cc5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4848
      • C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe
        "C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4580
        • C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe
          "C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3408
      • C:\Users\Admin\AppData\Local\Temp\1018476001\47d673e677.exe
        "C:\Users\Admin\AppData\Local\Temp\1018476001\47d673e677.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3956
      • C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe
        "C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe
          "C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2448
      • C:\Users\Admin\AppData\Local\Temp\1018478001\60e4f72928.exe
        "C:\Users\Admin\AppData\Local\Temp\1018478001\60e4f72928.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1344
      • C:\Users\Admin\AppData\Local\Temp\1018479001\acfce8c3fe.exe
        "C:\Users\Admin\AppData\Local\Temp\1018479001\acfce8c3fe.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4092
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\bsrvl"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4732
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4436
        • C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe
          "C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:4316
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe" & rd /s /q "C:\ProgramData\8YMO89ZUA1NY" & exit
            5⤵
            • System Location Discovery: System Language Discovery
            PID:6440
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              6⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:5180
        • C:\bsrvl\534a7c06a37242ea980153c8a71794c4.exe
          "C:\bsrvl\534a7c06a37242ea980153c8a71794c4.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4348
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2304
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c90446f8,0x7ff9c9044708,0x7ff9c9044718
              6⤵
                PID:1100
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                6⤵
                  PID:6696
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6712
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
                  6⤵
                    PID:6844
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                    6⤵
                      PID:7104
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                      6⤵
                        PID:1424
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:8
                        6⤵
                          PID:4548
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:8
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5076
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:1
                          6⤵
                            PID:4544
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1
                            6⤵
                              PID:1828
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:1
                              6⤵
                                PID:5256
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14385667945250372816,2341039799386586439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:1
                                6⤵
                                  PID:5204
                          • C:\Users\Admin\AppData\Local\Temp\1018480001\278cfd2587.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018480001\278cfd2587.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5008
                          • C:\Users\Admin\AppData\Local\Temp\1018481001\ddcb090c9a.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018481001\ddcb090c9a.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5048
                          • C:\Users\Admin\AppData\Local\Temp\1018482001\731c7ee537.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018482001\731c7ee537.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5332
                          • C:\Users\Admin\AppData\Local\Temp\1018483001\b14ea5fb12.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018483001\b14ea5fb12.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6356
                          • C:\Users\Admin\AppData\Local\Temp\1018484001\2771d3d7e8.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018484001\2771d3d7e8.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:4272
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM firefox.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2568
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM chrome.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3932
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM msedge.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:6152
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM opera.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5600
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM brave.exe /T
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5928
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                              4⤵
                                PID:6016
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                  5⤵
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5144
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd374f6d-86c2-44c7-ab29-4ea402f8e168} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" gpu
                                    6⤵
                                      PID:6824
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aeb6ce6e-db76-4e18-9f7c-3f2276d36cec} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" socket
                                      6⤵
                                        PID:6548
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3296 -childID 1 -isForBrowser -prefsHandle 3168 -prefMapHandle 3164 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7c1c658-fffb-4369-b6bb-b4469e6d2dd0} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab
                                        6⤵
                                          PID:2940
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3904 -childID 2 -isForBrowser -prefsHandle 4048 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32b6d2a9-bd9f-4f99-a14a-5bceea7220b0} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab
                                          6⤵
                                            PID:804
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4480 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 4872 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52d113b8-2c48-4082-883c-0afa8164c7fb} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" utility
                                            6⤵
                                            • Checks processor information in registry
                                            PID:6616
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a32cbc5-aafa-49bd-81d1-312f1cafb62c} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab
                                            6⤵
                                              PID:5476
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 4 -isForBrowser -prefsHandle 5376 -prefMapHandle 5380 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {abd048e6-60ea-4339-80ac-03921b6bff43} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab
                                              6⤵
                                                PID:4996
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5552 -childID 5 -isForBrowser -prefsHandle 5560 -prefMapHandle 5564 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1200 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d3c39e1-04e6-4ac0-a750-a5e3f63597ee} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" tab
                                                6⤵
                                                  PID:1964
                                          • C:\Users\Admin\AppData\Local\Temp\1018485001\52d6855ee3.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1018485001\52d6855ee3.exe"
                                            3⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Windows security modification
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:7128
                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3308
                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4900
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5784
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1740
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5508

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cda9f7a078.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            8ec831f3e3a3f77e4a7b9cd32b48384c

                                            SHA1

                                            d83f09fd87c5bd86e045873c231c14836e76a05c

                                            SHA256

                                            7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                                            SHA512

                                            26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            968cb9309758126772781b83adb8a28f

                                            SHA1

                                            8da30e71accf186b2ba11da1797cf67f8f78b47c

                                            SHA256

                                            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                            SHA512

                                            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                            SHA1

                                            010da169e15457c25bd80ef02d76a940c1210301

                                            SHA256

                                            6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                            SHA512

                                            e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            85ba073d7015b6ce7da19235a275f6da

                                            SHA1

                                            a23c8c2125e45a0788bac14423ae1f3eab92cf00

                                            SHA256

                                            5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                                            SHA512

                                            eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            68cf5d88b9b4069e48c6e3b5082d9931

                                            SHA1

                                            1e4d72be916415e8bc4b3c371436dea02cc39c27

                                            SHA256

                                            18cde95932bf89a317da77d6a792fc09ae471ab47fd5b20a40c818c764514123

                                            SHA512

                                            6f5dba12faf6382727650405f2bb06a4f544907624da9610dbfd842b56b00e78dffd5be787b3fc1a74ad7767f8a9220f4fca3bc7617eab2047fba036e0be80ff

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                            Filesize

                                            109B

                                            MD5

                                            0b64756b16390c79b5f1421cf590c88b

                                            SHA1

                                            3168c78f9664efcaca779e5c65719b19680938a8

                                            SHA256

                                            5f5e04f0e7aa920ec511fb26fc65eac096a16114d429a44ea063225a196ba47c

                                            SHA512

                                            04790e3c789b2e5203924117e7f58a5840db5985f8e31354a83764211f2a429fce40b646b2f61b4dbdebc88b8a5d71db6de0a45411b6e9b3ad6ec08bc089de7e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                            Filesize

                                            204B

                                            MD5

                                            a4879c3d3d952404f8d72cc5c06c9a9a

                                            SHA1

                                            ac22f6a5f915593760a403d06ba09f8658d6b237

                                            SHA256

                                            52fe29e84722d54cb4792c1d43b26f833bf430d012571abb10346b54b322066c

                                            SHA512

                                            3a6f12a0bf06c6f1ff4e3896fc92bac5e66a65891fc8ffd95a4eb20f9ffed887d97f49ea9176abd8a722d60c1bc75c68d0ec766ca4d5da77d6ab02d08c42bef5

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4OVS68NE\download[1].htm

                                            Filesize

                                            1B

                                            MD5

                                            cfcd208495d565ef66e7dff9f98764da

                                            SHA1

                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                            SHA256

                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                            SHA512

                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            18KB

                                            MD5

                                            745d16431138183137b974626976d937

                                            SHA1

                                            3c117e723a5e9a118811dbdb1be23c2dbdd93205

                                            SHA256

                                            45ee7138d85f7589b4933474311622435d676e0b28ce03ca41c19e2b9524aee5

                                            SHA512

                                            63539269ba8bf31b947197f1ad47f4e3f8e5a177af4b522be797fd07cf3877c4e3a80b6b84f9068e437383d08a7bc68e039683705ee1c3ee86d9f6a92ba75810

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            18KB

                                            MD5

                                            9bff9655c3fa38d674220322d8016a91

                                            SHA1

                                            10d3dd8e00ecd659601dc84bc6f1ca1468604925

                                            SHA256

                                            910958720e1752f22bb22d6a05aa61945487a4a21e65933c154ebd6881dc32c5

                                            SHA512

                                            0ea15765420337bcb355b6972babb5d05ec6a299a5bd74dcf71a17c030d339c6f9ff259307ec71c164e1940f497587284974af08346665ec5c6421ac890ba4f7

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            18KB

                                            MD5

                                            54b4dbeb3282a05b3f2a310606b4db8a

                                            SHA1

                                            84615894a13585ecd51c9ea060f23e6a2c5c5d52

                                            SHA256

                                            81d8040e56b8e332b6d17054dd4065d073f29cdcb7d0929754a93422008490b0

                                            SHA512

                                            2c14f697ac2f3aa4b0c580e78b067382156eab6beb372c9ed49f5500aff4979d7e9b6745d29e667e8315581dac4fe39b560baf42104651dbfd9f1417bf4a10f6

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json

                                            Filesize

                                            25KB

                                            MD5

                                            cff067d16e7f6063015f7040d5ae9736

                                            SHA1

                                            7476f25e36920ac01fed6b49bbeb71b321e4b09a

                                            SHA256

                                            ae6b8db6378ae2de7732b7f83089359d5875b8d45f8541691226e499f51a8180

                                            SHA512

                                            2448d6c1662376c903dff9760f9a6be888edf7b587e16420c2c47819567cb669030d4df584c849cf563edf9fb6c3c22ed8a41add22e6fa7f7298bb31f202a653

                                          • C:\Users\Admin\AppData\Local\Temp\1018469001\c4de8727c5.exe

                                            Filesize

                                            3.1MB

                                            MD5

                                            c00a67d527ef38dc6f49d0ad7f13b393

                                            SHA1

                                            7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                                            SHA256

                                            12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                                            SHA512

                                            9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                                          • C:\Users\Admin\AppData\Local\Temp\1018471001\3638cfc73c.exe

                                            Filesize

                                            21KB

                                            MD5

                                            14becdf1e2402e9aa6c2be0e6167041e

                                            SHA1

                                            72cbbae6878f5e06060a0038b25ede93b445f0df

                                            SHA256

                                            7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                                            SHA512

                                            16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                                          • C:\Users\Admin\AppData\Local\Temp\1018472001\79b6f4cab4.exe

                                            Filesize

                                            758KB

                                            MD5

                                            afd936e441bf5cbdb858e96833cc6ed3

                                            SHA1

                                            3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                            SHA256

                                            c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                            SHA512

                                            928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                          • C:\Users\Admin\AppData\Local\Temp\1018473001\5d6ab90cc5.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            25fb9c54265bbacc7a055174479f0b70

                                            SHA1

                                            4af069a2ec874703a7e29023d23a1ada491b584e

                                            SHA256

                                            552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                                            SHA512

                                            7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                                          • C:\Users\Admin\AppData\Local\Temp\1018474001\vmLn5k4.exe

                                            Filesize

                                            624KB

                                            MD5

                                            4aea5a8f9b59c7597b447b2b416b7e12

                                            SHA1

                                            5548f8639093dd69fd53a08785bd8d7cfe25e711

                                            SHA256

                                            e354123018be2e65447d53314007e8ce3cb7131f1c7c262cf4378de6e32064d8

                                            SHA512

                                            4208a35aa7daec0c0b54b4f7a4f82b889768adefacfbc6a9004192b44e8ba7017b40aaa1e0936c6b37fc2277708d150e1aa9738994aeeb779200caef5ec437ee

                                          • C:\Users\Admin\AppData\Local\Temp\1018475001\cda9f7a078.exe

                                            Filesize

                                            1.1MB

                                            MD5

                                            ef08a45833a7d881c90ded1952f96cb4

                                            SHA1

                                            f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                                            SHA256

                                            33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                                            SHA512

                                            74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                                          • C:\Users\Admin\AppData\Local\Temp\1018476001\47d673e677.exe

                                            Filesize

                                            4.3MB

                                            MD5

                                            63014ddb15ca6ee8aed525a9e2df6d85

                                            SHA1

                                            5739c8445d8dd442d361cfbbf46944ef24e7bc32

                                            SHA256

                                            20f1886866cbc38597da35d91a554c4078744d74a07c46ca2633c76a62216c50

                                            SHA512

                                            5fc0d017cbaee34bab83480d819a9803605716d57ad787a48b033216974538f272a97c70be223dd518f518ba207201174585d0d597b767d190246eb83eaee641

                                          • C:\Users\Admin\AppData\Local\Temp\1018477001\1ca1dcbec5.exe

                                            Filesize

                                            791KB

                                            MD5

                                            e8af4d0d0b47ac68d762b7f288ae8e6e

                                            SHA1

                                            1d65f31526cc20ab41d6b1625d6674d7f13e326c

                                            SHA256

                                            b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e

                                            SHA512

                                            80fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a

                                          • C:\Users\Admin\AppData\Local\Temp\1018478001\60e4f72928.exe

                                            Filesize

                                            1.3MB

                                            MD5

                                            669ed3665495a4a52029ff680ec8eba9

                                            SHA1

                                            7785e285365a141e307931ca4c4ef00b7ecc8986

                                            SHA256

                                            2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                                            SHA512

                                            bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                                          • C:\Users\Admin\AppData\Local\Temp\1018479001\acfce8c3fe.exe

                                            Filesize

                                            21KB

                                            MD5

                                            04f57c6fb2b2cd8dcc4b38e4a93d4366

                                            SHA1

                                            61770495aa18d480f70b654d1f57998e5bd8c885

                                            SHA256

                                            51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                                            SHA512

                                            53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                                          • C:\Users\Admin\AppData\Local\Temp\1018480001\278cfd2587.exe

                                            Filesize

                                            4.3MB

                                            MD5

                                            c56fed47e77d1b3103c94496f1371878

                                            SHA1

                                            8b1ac848c5ef777e8de09157301043d6367f59ae

                                            SHA256

                                            2c57a53d4a3c03769ed9302fc18cff7a4a5f26e4164023814cc28e92565d7381

                                            SHA512

                                            a61f54e66cc8c4af23a79f5f4da2aa2a0fed8fb7452914bef6b9e9441ed075337ccb34300b0adb2be9bb93a54255578bcba2ebfac81d4fd7ca1fc396cff42184

                                          • C:\Users\Admin\AppData\Local\Temp\1018481001\ddcb090c9a.exe

                                            Filesize

                                            1.9MB

                                            MD5

                                            1f39fac8d8f8c1e3e0697ebf585af36c

                                            SHA1

                                            f98243a6bdea8f7de4cfa02d157e94b1cf925f51

                                            SHA256

                                            ec2349f4f55242a8328a7f11c5013a7525fa05aa18a680c1d82f2d6d93e6e1ad

                                            SHA512

                                            ebf1551cc77e6f815f18ebd38ffc3b581fbc0b07642175db9178652e3cad6be0a38bf978ea09d46815ca64b1482a87261ac5e34303b14420ce89c7c684a7aaed

                                          • C:\Users\Admin\AppData\Local\Temp\1018482001\731c7ee537.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            8ed130f18d336710681892376077e84b

                                            SHA1

                                            e17b7408774e6af987df8bbd305cf90a04907127

                                            SHA256

                                            cff3b8f3932251726136a77b23eb614eb05aba1779fa8de5fa6ee2a062d9f61b

                                            SHA512

                                            e09e49f9df4c8037a12ba224796abb12e422d1ec289f94a3d0a4cac7e454fbdda48c5c7fa3c08c9b90c8ffbf58c2ff931bef7db49ef5ed5f2bebc143c7d85456

                                          • C:\Users\Admin\AppData\Local\Temp\1018483001\b14ea5fb12.exe

                                            Filesize

                                            2.8MB

                                            MD5

                                            afea54bb6f5e4adb448036812363ca2e

                                            SHA1

                                            9626b3093dc9c9aa2982462b14258b7ff9f8e256

                                            SHA256

                                            9742f2ebcfdac7645f7872e538cfde538ad165eab94e1f934bb8ebd1ab18aed4

                                            SHA512

                                            59231960ead5c1001e03164248fe3d771aadba467cfdbcf30138286962ab779961c6319b417bd6a751bcfe432fb56efc5d35a225a9965ee07d60809e60484527

                                          • C:\Users\Admin\AppData\Local\Temp\1018484001\2771d3d7e8.exe

                                            Filesize

                                            945KB

                                            MD5

                                            b852844c66ac5353d1845da793aa6edb

                                            SHA1

                                            9621b93409d8d279d4bddb690bbeb68d88e812a9

                                            SHA256

                                            0e7087f6bfb5a93066e8fa0132d7de6cc535213147aa1ccbe947ccd905ee54e9

                                            SHA512

                                            d67c3fb0d5912c22f3487b0cb39710ab6567db99bb5011d85e53baea8d0b5a852845bc51f7f079bbd32063238f879b486c4c4fdb5d5b86ea3e8ff004e4f6569b

                                          • C:\Users\Admin\AppData\Local\Temp\1018485001\52d6855ee3.exe

                                            Filesize

                                            2.6MB

                                            MD5

                                            3932047ba13c345b7bf0f916570b975c

                                            SHA1

                                            e5d8f6be91e7a58bffb8eb8902cde50ba8d21156

                                            SHA256

                                            26cfec473064d6fc67596636ac0af118716962555255f7336b71698bf4423a25

                                            SHA512

                                            ce4487112ce042247c51dbd6948a8e8bb9301bf0e997596309bed267264a5dac29f410912fef964ccab7e0c73d8e678506809eebbacaa7e4ce1b15fb64a2b7a9

                                          • C:\Users\Admin\AppData\Local\Temp\Tmp73EE.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            a10f31fa140f2608ff150125f3687920

                                            SHA1

                                            ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b

                                            SHA256

                                            28c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6

                                            SHA512

                                            cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ac1gtjxb.var.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                            Filesize

                                            2.9MB

                                            MD5

                                            dac73e7813dc3500e5f677b5f31191df

                                            SHA1

                                            bf5eaa68905a19d7cda4cc824267d5fbfc27785a

                                            SHA256

                                            6b6ee9cae47a7d7d51218397669ea2644853643e8d7557b20a90dc49e203893e

                                            SHA512

                                            7e26aa8fa617887d322ff823d6133dc677cd6c7e5ff2d1b14f6db689dff185e4f668802037bcd38e2134965892f71aabb4b274ae5568adb6e2ad065f93d593ba

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            6KB

                                            MD5

                                            68fc1ee1dc33befe72276c0bc26e4519

                                            SHA1

                                            e94976b11bdbcc8728a76ab724355593771716d5

                                            SHA256

                                            1e83bfc3d2d2a93366bb7fc21ee3f9b0607d4697779dd7c50568d119374fcaa1

                                            SHA512

                                            65163d68743551311550090d326eb46bed11e81828d44606bfa4b2d9c6176a189ddd071caa50277e5806421aba48ded8f5ce8208c80452bd8add20d0eb1f4168

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            5KB

                                            MD5

                                            ce13b4e96a3a5237c0ed2e24e59934a2

                                            SHA1

                                            8c2e9f4909fd30ef59f9978aa33ca7aad70fa9ed

                                            SHA256

                                            be8014d0c1c3844673ac6cd3074cc0367c1d2b676c851aebd2be3d11a7ebe8aa

                                            SHA512

                                            dc95bdb7a78dc6d5721d811d0fa2f686744f5f5c721ef1947dcf7806ebd1b4fd6fb8f0f63adca42930ccd6d53fc702ac390479985a3506771db3cc3aa1299f63

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            5KB

                                            MD5

                                            ae9fd9a01e42d550c7354a8d5ac7fd67

                                            SHA1

                                            2b102aca8687a921fb8b70217e44324acc9cc466

                                            SHA256

                                            95b6e8fb6552c77bc0e141732986d3a52f4b1469d3bfcdff946b85de85739f09

                                            SHA512

                                            29f681011e6952d87f08b399d8802915ab22848e21fa18094dd5898136c24a4f42d0f1ae81ac028f6ef87a4730b71b8e3b055a16aada062a5a2a49967458f43d

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            6KB

                                            MD5

                                            2371e7da2bafb7e2ed77a21e0cb86d1d

                                            SHA1

                                            70fb49ee721cdd5d2ca276b5e33fbfdf1c2a6d68

                                            SHA256

                                            cb73c371fd11a5279ecc200fdab57190ce725a73905ec1e012a2e37a7322f470

                                            SHA512

                                            dda2e07bbd795e877270164ebfe6b1886352adfa10d93a9c521e4371ffa5e05ed73a23163d8dd1360443433452d26b5f8fc40c9fa3e7a102c24cabaf54ffada3

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\6f3323d1-3454-4bc5-9f12-732db388b117

                                            Filesize

                                            25KB

                                            MD5

                                            0ef59510e45d3e601613d73a74de6e70

                                            SHA1

                                            7ac2f1db56d3bfa07f3c59cbbbd198c0c0429353

                                            SHA256

                                            cd1a8a13ff31c16e9882236d785ebc053ec23b892a02c6a5375bd2e05037337a

                                            SHA512

                                            34ef1391626ed5abdbb8debd6206954c9626e0bc8fef9e6dd4b0cc0d2b1e84b22b5555e6ee3a35663e5bd49129be7ab1ce7325cf4d508a943587ee8784ae9798

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\8eb6c8ba-92a4-4dc6-b5a2-804262256941

                                            Filesize

                                            982B

                                            MD5

                                            7a98b2deb23686b6dcb4cd7d0c0bf2ed

                                            SHA1

                                            68510f7af7ec1a91a5e158167652a64b3fb5003b

                                            SHA256

                                            e712a4dfa6308a524cd918bc377fefc834bfb1f323643b2f1296b3dc712bf61d

                                            SHA512

                                            778881d80461a6438129e2bf0453106a201b46c61d4cbd3aeeb8a8fce082c52ef5dbf14eefedbbed9e556ea357e73497b1bef4fe14a01a5459891aebb603799d

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d271e3d9-c86f-4eaf-b9bb-03cacac7f6f4

                                            Filesize

                                            671B

                                            MD5

                                            281a40d73b9a8fe00e646796f095497b

                                            SHA1

                                            4910025c01eaa1185ea193064ab6bf863284cae9

                                            SHA256

                                            c3b7bfd37541b854fb26b089c89da38e514e637f3dcf2e77b10de095d7488f7b

                                            SHA512

                                            1e5b3437a7a7964647e2b2ef902330e27921c5f12c5f1f653e198065f4ba526c2a3de831b4c984e20de9abd22afb8852254ea379665d1a5a39aa55b416de890f

                                          • C:\bsrvl\111e246ae43f4db3b1169b01ddaeddd5.exe

                                            Filesize

                                            144KB

                                            MD5

                                            cc36e2a5a3c64941a79c31ca320e9797

                                            SHA1

                                            50c8f5db809cfec84735c9f4dcd6b55d53dfd9f5

                                            SHA256

                                            6fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8

                                            SHA512

                                            fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0

                                          • C:\bsrvl\534a7c06a37242ea980153c8a71794c4.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            971b0519b1c0461db6700610e5e9ca8e

                                            SHA1

                                            9a262218310f976aaf837e54b4842e53e73be088

                                            SHA256

                                            47cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023

                                            SHA512

                                            d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9

                                          • C:\onismephiz\a69515003e0643aeb56a1cdbfc2c2295.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            577cd52217da6d7163cea46bb01c107f

                                            SHA1

                                            82b31cc52c538238e63bdfc22d1ea306ea0b852a

                                            SHA256

                                            139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728

                                            SHA512

                                            8abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474

                                          • memory/116-180-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-200-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-186-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-253-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-230-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-206-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-197-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-203-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-212-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/116-185-0x0000000000190000-0x000000000054B000-memory.dmp

                                            Filesize

                                            3.7MB

                                          • memory/996-117-0x0000000000400000-0x0000000000456000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/996-119-0x0000000000400000-0x0000000000456000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1344-353-0x0000000000730000-0x0000000000786000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1668-191-0x0000000000400000-0x0000000000456000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/1668-193-0x0000000000400000-0x0000000000456000-memory.dmp

                                            Filesize

                                            344KB

                                          • memory/2036-66-0x0000000000EA0000-0x0000000000EAC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2448-288-0x0000000000400000-0x0000000000455000-memory.dmp

                                            Filesize

                                            340KB

                                          • memory/2448-286-0x0000000000400000-0x0000000000455000-memory.dmp

                                            Filesize

                                            340KB

                                          • memory/3308-114-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3308-121-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-20-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-184-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-21-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-178-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-19-0x0000000000581000-0x00000000005AF000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/3336-205-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-22-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-285-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-229-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-16-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-196-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-23-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-24-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-199-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-25-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-211-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-202-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-67-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3336-352-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3408-404-0x0000000004DE0000-0x0000000004E78000-memory.dmp

                                            Filesize

                                            608KB

                                          • memory/3408-417-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-2484-0x0000000004E80000-0x0000000004EAC000-memory.dmp

                                            Filesize

                                            176KB

                                          • memory/3408-2486-0x0000000004EF0000-0x0000000004F3C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/3408-406-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-407-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-409-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-411-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-415-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-400-0x0000000000400000-0x0000000000464000-memory.dmp

                                            Filesize

                                            400KB

                                          • memory/3408-419-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-421-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-423-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-425-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3408-413-0x0000000004DE0000-0x0000000004E71000-memory.dmp

                                            Filesize

                                            580KB

                                          • memory/3956-269-0x0000000000B30000-0x00000000017C0000-memory.dmp

                                            Filesize

                                            12.6MB

                                          • memory/3956-326-0x0000000000B30000-0x00000000017C0000-memory.dmp

                                            Filesize

                                            12.6MB

                                          • memory/4092-324-0x0000000000A10000-0x0000000000A1C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/4316-2501-0x0000000000400000-0x0000000000639000-memory.dmp

                                            Filesize

                                            2.2MB

                                          • memory/4316-2581-0x0000000000400000-0x0000000000639000-memory.dmp

                                            Filesize

                                            2.2MB

                                          • memory/4348-2515-0x00000251C91C0000-0x00000251C927A000-memory.dmp

                                            Filesize

                                            744KB

                                          • memory/4348-2531-0x00000251C8840000-0x00000251C8852000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4348-2534-0x00000251CB730000-0x00000251CB768000-memory.dmp

                                            Filesize

                                            224KB

                                          • memory/4348-2535-0x00000251CB700000-0x00000251CB70E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/4348-2536-0x00000251CC7E0000-0x00000251CC966000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4348-2567-0x00000251CC9C0000-0x00000251CC9E6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4348-2513-0x00000251AD330000-0x00000251AD432000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/4348-2533-0x00000251C94D0000-0x00000251C94D8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4348-2514-0x00000251AF190000-0x00000251AF19A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4348-2532-0x00000251C8AC0000-0x00000251C8AFC000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/4436-405-0x0000000007730000-0x0000000007741000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4436-387-0x000000006F700000-0x000000006F74C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4436-397-0x0000000007460000-0x0000000007503000-memory.dmp

                                            Filesize

                                            652KB

                                          • memory/4436-370-0x0000000006240000-0x000000000628C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4436-2489-0x0000000007770000-0x0000000007784000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4436-368-0x0000000005C90000-0x0000000005FE4000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4580-325-0x0000000005C60000-0x0000000005D22000-memory.dmp

                                            Filesize

                                            776KB

                                          • memory/4580-252-0x0000000007EB0000-0x0000000007ED6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4580-249-0x0000000000E00000-0x0000000000F16000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/4580-250-0x0000000007CA0000-0x0000000007D32000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/4580-251-0x0000000005270000-0x000000000527A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4732-350-0x0000000007660000-0x0000000007671000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4732-338-0x0000000006160000-0x00000000061AC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4732-349-0x0000000007380000-0x0000000007423000-memory.dmp

                                            Filesize

                                            652KB

                                          • memory/4732-351-0x0000000007690000-0x00000000076A4000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4732-336-0x0000000005D20000-0x0000000006074000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4732-339-0x000000006F160000-0x000000006F1AC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4828-144-0x000000006F910000-0x000000006F95C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4828-142-0x00000000055B0000-0x0000000005904000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4848-227-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-210-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-187-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-182-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-228-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-204-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-168-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-198-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-201-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4848-183-0x0000000000D10000-0x00000000011BB000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4860-1-0x0000000077494000-0x0000000077496000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/4860-0-0x00000000009C0000-0x0000000000CDD000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4860-18-0x00000000009C0000-0x0000000000CDD000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4860-2-0x00000000009C1000-0x00000000009EF000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/4860-3-0x00000000009C0000-0x0000000000CDD000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4860-4-0x00000000009C0000-0x0000000000CDD000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4900-209-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4900-208-0x0000000000580000-0x000000000089D000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4952-120-0x0000000006E70000-0x0000000006E7A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4952-70-0x0000000004B20000-0x0000000004B42000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4952-115-0x0000000007440000-0x0000000007ABA000-memory.dmp

                                            Filesize

                                            6.5MB

                                          • memory/4952-127-0x0000000007120000-0x0000000007128000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4952-126-0x0000000007140000-0x000000000715A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4952-101-0x0000000006090000-0x00000000060C2000-memory.dmp

                                            Filesize

                                            200KB

                                          • memory/4952-125-0x0000000007040000-0x0000000007054000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4952-68-0x0000000000BA0000-0x0000000000BD6000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/4952-69-0x0000000004D10000-0x0000000005338000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/4952-122-0x0000000007080000-0x0000000007116000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/4952-116-0x0000000006E00000-0x0000000006E1A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4952-82-0x0000000005520000-0x0000000005874000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4952-102-0x000000006F910000-0x000000006F95C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4952-72-0x00000000054B0000-0x0000000005516000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/4952-123-0x0000000007000000-0x0000000007011000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4952-112-0x0000000006CA0000-0x0000000006CBE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/4952-124-0x0000000007030000-0x000000000703E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/4952-113-0x0000000006CC0000-0x0000000006D63000-memory.dmp

                                            Filesize

                                            652KB

                                          • memory/4952-84-0x0000000005B00000-0x0000000005B4C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4952-71-0x0000000005440000-0x00000000054A6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/4952-83-0x0000000005AE0000-0x0000000005AFE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/5008-399-0x0000000000500000-0x0000000001180000-memory.dmp

                                            Filesize

                                            12.5MB

                                          • memory/5008-386-0x0000000000500000-0x0000000001180000-memory.dmp

                                            Filesize

                                            12.5MB

                                          • memory/5048-2668-0x0000000000400000-0x0000000000C7B000-memory.dmp

                                            Filesize

                                            8.5MB

                                          • memory/5048-2488-0x0000000000400000-0x0000000000C7B000-memory.dmp

                                            Filesize

                                            8.5MB

                                          • memory/5052-47-0x00000000730A0000-0x0000000073850000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/5052-46-0x0000000005890000-0x000000000592C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/5052-131-0x00000000730A0000-0x0000000073850000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/5052-188-0x0000000005B70000-0x0000000005CC6000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/5052-189-0x0000000006270000-0x0000000006814000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/5052-130-0x00000000730AE000-0x00000000730AF000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5052-195-0x00000000730A0000-0x0000000073850000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/5052-190-0x0000000005790000-0x00000000057B2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/5052-45-0x0000000000AF0000-0x0000000000E18000-memory.dmp

                                            Filesize

                                            3.2MB

                                          • memory/5052-44-0x00000000730AE000-0x00000000730AF000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5332-2591-0x0000000000830000-0x0000000000CDA000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5332-2554-0x0000000000830000-0x0000000000CDA000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/6356-2666-0x0000000000D30000-0x000000000122A000-memory.dmp

                                            Filesize

                                            5.0MB

                                          • memory/6356-2626-0x0000000000D30000-0x000000000122A000-memory.dmp

                                            Filesize

                                            5.0MB

                                          • memory/7128-2895-0x0000000000DA0000-0x000000000103C000-memory.dmp

                                            Filesize

                                            2.6MB