Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2025, 15:45

General

  • Target

    df504a29ad522d6eabe6258886d296bc.exe

  • Size

    1.8MB

  • MD5

    df504a29ad522d6eabe6258886d296bc

  • SHA1

    70d007b95628877924e5a41cceabcba93bc46a80

  • SHA256

    c0472272fbb70a86f21f0b3f156a74e29c9cb3b9c56fefc5594e90879144d4b9

  • SHA512

    3c356a28dbc7bd1e3c3219cb6f1c55f8ed68702d8e814d9e4de47a0fdb1ebbbaeacc1d7375b157fba7cfaf2487e2a2adde26db121c6f1c5ea1d1c8ce5085ac79

  • SSDEEP

    24576:IkJ43JIC/TVPGIYZ6KQ9s7/FtxWF1nJ/zFN4qTYZkNLH/PcFPoO9Rvj2QXNij:II47/T9+oKQ+/WFXFN4qTYZeLkRouTN

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file 12 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 48 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 59 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\df504a29ad522d6eabe6258886d296bc.exe
        "C:\Users\Admin\AppData\Local\Temp\df504a29ad522d6eabe6258886d296bc.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Users\Admin\AppData\Local\Temp\10341520101\3c98108856.exe
            "C:\Users\Admin\AppData\Local\Temp\10341520101\3c98108856.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1932
          • C:\Users\Admin\AppData\Local\Temp\10341530101\efcba330ac.exe
            "C:\Users\Admin\AppData\Local\Temp\10341530101\efcba330ac.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2388
          • C:\Users\Admin\AppData\Local\Temp\10341540101\1c0c14deeb.exe
            "C:\Users\Admin\AppData\Local\Temp\10341540101\1c0c14deeb.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1872
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1592
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1988
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:588
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2432
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3004
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1572
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                6⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1564
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.0.1473680100\183032677" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1232 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {32865a00-ad2a-4fdb-b54b-d57fbd07d3f6} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 1320 fed4258 gpu
                  7⤵
                    PID:2788
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.1.1113277493\1741992168" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {41b6a205-b7b3-4ac2-b6fa-c1441ca5db6f} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 1544 ecec158 socket
                    7⤵
                      PID:2656
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.2.588678837\825109254" -childID 1 -isForBrowser -prefsHandle 1992 -prefMapHandle 1988 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc726d8d-fad3-4512-b6b0-978581a58b7e} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 2004 19885758 tab
                      7⤵
                        PID:1412
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.3.1219808936\1823743742" -childID 2 -isForBrowser -prefsHandle 2588 -prefMapHandle 2584 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08cb477d-09ba-48e9-b086-4e2e21656f82} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 2600 d64b58 tab
                        7⤵
                          PID:2852
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.4.1789698669\1033666299" -childID 3 -isForBrowser -prefsHandle 3856 -prefMapHandle 3848 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbaa7f99-098e-4ec1-82bf-0f0cc1057f6d} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 3880 1fc3d158 tab
                          7⤵
                            PID:1512
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.5.1947732552\43635199" -childID 4 -isForBrowser -prefsHandle 3992 -prefMapHandle 3996 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81c5f647-0d02-4306-8ab9-d811b3c21a70} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 3984 1fd1d558 tab
                            7⤵
                              PID:2640
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1564.6.1151258571\668694635" -childID 5 -isForBrowser -prefsHandle 4160 -prefMapHandle 4164 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4ce81f4-eb90-4def-8439-bd7868ea8665} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" 4152 1fd1db58 tab
                              7⤵
                                PID:2528
                        • C:\Users\Admin\AppData\Local\Temp\10341550101\760142ba86.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341550101\760142ba86.exe"
                          4⤵
                          • Modifies Windows Defender DisableAntiSpyware settings
                          • Modifies Windows Defender Real-time Protection settings
                          • Modifies Windows Defender TamperProtection settings
                          • Modifies Windows Defender notification settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:324
                        • C:\Users\Admin\AppData\Local\Temp\10341560101\37b4a1bdcc.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341560101\37b4a1bdcc.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3232
                        • C:\Users\Admin\AppData\Local\Temp\10341570101\4bEpXMZ.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341570101\4bEpXMZ.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:3580
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 3580 -s 36
                            5⤵
                            • Loads dropped DLL
                            PID:3628
                        • C:\Users\Admin\AppData\Local\Temp\10341590101\e7dd32382e.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341590101\e7dd32382e.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Loads dropped DLL
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3772
                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                            "C:\Users\Admin\AppData\Local\Temp\10341590101\e7dd32382e.exe"
                            5⤵
                            • Downloads MZ/PE file
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3972
                        • C:\Users\Admin\AppData\Local\Temp\10341600101\e76d34dc1a.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341600101\e76d34dc1a.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Loads dropped DLL
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3156
                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                            "C:\Users\Admin\AppData\Local\Temp\10341600101\e76d34dc1a.exe"
                            5⤵
                            • Downloads MZ/PE file
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1032
                        • C:\Users\Admin\AppData\Local\Temp\10341610101\4bEpXMZ.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341610101\4bEpXMZ.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:3500
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 3500 -s 36
                            5⤵
                            • Loads dropped DLL
                            PID:3576
                        • C:\Users\Admin\AppData\Local\Temp\10341630101\BIm18E9.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341630101\BIm18E9.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3236
                        • C:\Users\Admin\AppData\Local\Temp\10341640101\7IIl2eE.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341640101\7IIl2eE.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:3796
                          • C:\Windows\SysWOW64\CMD.exe
                            "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                            5⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3884
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              6⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3688
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "opssvc wrsa"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2760
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              6⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3468
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:1836
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 418377
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2300
                            • C:\Windows\SysWOW64\extrac32.exe
                              extrac32 /Y /E Leon.cab
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3680
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /V "BEVERAGES" Compilation
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3776
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3996
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:4080
                            • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                              Passwords.com N
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3788
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2968
                        • C:\Users\Admin\AppData\Local\Temp\10341650101\TbV75ZR.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341650101\TbV75ZR.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:3216
                          • C:\Windows\SysWOW64\CMD.exe
                            "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                            5⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3188
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              6⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:920
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "opssvc wrsa"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3196
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              6⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1784
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:828
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 267978
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2880
                            • C:\Windows\SysWOW64\extrac32.exe
                              extrac32 /Y /E Spanish.vss
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3648
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /V "East" Removed
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3244
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3452
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3384
                            • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                              Exam.com j
                              6⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3720
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:4048
                        • C:\Users\Admin\AppData\Local\Temp\10341660101\f73ae_003.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341660101\f73ae_003.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3984
                        • C:\Users\Admin\AppData\Local\Temp\10341670101\WLbfHbp.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341670101\WLbfHbp.exe"
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:3656
                          • C:\Windows\SysWOW64\CMD.exe
                            "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                            5⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3124
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              6⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:292
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "opssvc wrsa"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2616
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              6⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3132
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3068
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 267978
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:1880
                            • C:\Windows\SysWOW64\extrac32.exe
                              extrac32 /Y /E Spanish.vss
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:1668
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3548
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2712
                            • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                              Exam.com j
                              6⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3496
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3624
                        • C:\Users\Admin\AppData\Local\Temp\10341680101\8aa5116110.exe
                          "C:\Users\Admin\AppData\Local\Temp\10341680101\8aa5116110.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:3336
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 3336 -s 64
                            5⤵
                            • Loads dropped DLL
                            PID:3368
                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                      "C:\Users\Admin\AppData\Local\Temp\svchost015.exe"
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3748
                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                      "C:\Users\Admin\AppData\Local\Temp\svchost015.exe"
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3988

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\service[1].htm

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\soft[1]

                    Filesize

                    3.0MB

                    MD5

                    2cb4cdd698f1cbc9268d2c6bcd592077

                    SHA1

                    86e68f04bc99f21c9d6e32930c3709b371946165

                    SHA256

                    c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

                    SHA512

                    606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    26KB

                    MD5

                    ffebf2ed16a6b1e446f0a5b96190d380

                    SHA1

                    7250f7ef16850cf53a44d1b3ac2d3f6ffef5fc69

                    SHA256

                    0fc178c67adb4f2cf0015a1a1edfedb0f58d2b05d04416547ac96b45826851aa

                    SHA512

                    569426306459833d82186ff3824c7cb437a9e40271b23968af43276492d98ee4cc09fcffdaaa2f6d86db66be0e00f7260818cc8f72dcd2d39b30dc2424b731de

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\Temp\10341520101\3c98108856.exe

                    Filesize

                    2.9MB

                    MD5

                    4e745bef2316cf25a4216973d84dd4b7

                    SHA1

                    7a6db79446ede4a332e824188da56956a15ccc70

                    SHA256

                    d53e9a84cb8179991cadf11e9dc1be679763cc13efee49f80ea04a977092ba93

                    SHA512

                    eb599584d6c3287fcaf8c7814198a045f077880db8302b1bad120069e307bbc29a9e583bc1a6ae799626b1d4b9af7669b2812c48923b9eab0e2d68c12daeae6d

                  • C:\Users\Admin\AppData\Local\Temp\10341530101\efcba330ac.exe

                    Filesize

                    1.7MB

                    MD5

                    7e83c20b9ce15ed9a767cf576f4091db

                    SHA1

                    7eb491e3d433e2bea4811e8c39a28ece9a148a4a

                    SHA256

                    120f3895d3af82e4f273da4469c41e9b886008b3c64dbac1b6c0e7fd44bfd8d1

                    SHA512

                    6127d5077816bb36338c9c377e436fd886b1acd6f6d439d119e21bd9b21e26358b919c68c8805e3a2bc26ba29086ad1969dae21c84cf9f55d15f6f136497bcde

                  • C:\Users\Admin\AppData\Local\Temp\10341540101\1c0c14deeb.exe

                    Filesize

                    951KB

                    MD5

                    eda8115a6938f7919b3c4216f9988022

                    SHA1

                    12fe34a91042ebbea1d7202c1aa0783228bcd44d

                    SHA256

                    65a842580fb705c163d59e5008146c78e93becc4cfcef6ccbc55f1903171e4f7

                    SHA512

                    5da807636fdfe1ece461a39ef83f31c69b1ecdf76e550cc15a05a1c5dbd6d0aa947f50d724f714fa6e78d034e0c3739f931f96d4144e0f8864962485d85e04bc

                  • C:\Users\Admin\AppData\Local\Temp\10341550101\760142ba86.exe

                    Filesize

                    1.7MB

                    MD5

                    ed05e17cbba537819acb8413a2158914

                    SHA1

                    8cd63227ed244652a1de665cc72939cf30d21fd9

                    SHA256

                    7e629e6947968683a2a604c32ec825b2f6d9edba93d2cc01fb9755cbdecf1378

                    SHA512

                    2f96740552f538acf698c75fadee97e6334d6f96ed6965f93b3e676c20258ee3c5b5c1a29d41181708f4a02848f4e7c819a3f84af770e54b939d5af869bac3e5

                  • C:\Users\Admin\AppData\Local\Temp\10341560101\37b4a1bdcc.exe

                    Filesize

                    1.8MB

                    MD5

                    47b3f376188efdf744ce07f23cd8da94

                    SHA1

                    fd29dab640191d853d8c9fd632514ea0a4cba0a8

                    SHA256

                    43ffcbde001d60632d173e32239142ac13f00664858edf74208559ffb59a9d55

                    SHA512

                    ed6c4b9cfbaa028d468884f8cdbef7340a4890610860c95df10354bd9026b02839df355eee8356e5c9f466f9e278bf9b3a43311c7fc9da6f11aa9cc4986e85f7

                  • C:\Users\Admin\AppData\Local\Temp\10341570101\4bEpXMZ.exe

                    Filesize

                    1.4MB

                    MD5

                    fc6cd346462b85853040586c7af71316

                    SHA1

                    fd2e85e7252fb1f4bfba00c823abed3ec3e501e1

                    SHA256

                    5a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de

                    SHA512

                    382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746

                  • C:\Users\Admin\AppData\Local\Temp\10341590101\e7dd32382e.exe

                    Filesize

                    4.5MB

                    MD5

                    14fa57867af1ee897ab6c03210aa1f3a

                    SHA1

                    cfae2955f30fe7dd7d3599db59cbf6d88626edc9

                    SHA256

                    59b1ec5f22c9b4623ad74a8e2243f2f4553c26c64c93022ead93a9d7996e400f

                    SHA512

                    df7844d2201fbb6fdf4bbdfadc82fc830ac91f4064e921d389adcff1bbd54932f1164de94b85adb1d38f89c63ef523ff5c1e65a2d6d9bd605c5231fa83157fdc

                  • C:\Users\Admin\AppData\Local\Temp\10341600101\e76d34dc1a.exe

                    Filesize

                    4.4MB

                    MD5

                    7186f759a7c421ec1228098f0ebdab11

                    SHA1

                    fb72f2d7ffc515abd6860c49326546c8b5ff4f58

                    SHA256

                    7af066dc7db57f8053af661d174388ae69346e0d4f36f0ef62db1c406c2be58f

                    SHA512

                    3f2555aff7ffb2e3af7044dad461c88d63df53bfe21da09312ef225d1c2df6394a10b91683e12278bd934371a7f94add11ac5b210d5ee81e981f844234f0247b

                  • C:\Users\Admin\AppData\Local\Temp\10341630101\BIm18E9.exe

                    Filesize

                    4.9MB

                    MD5

                    c909efcf6df1f5cab49d335588709324

                    SHA1

                    43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                    SHA256

                    d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                    SHA512

                    68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                  • C:\Users\Admin\AppData\Local\Temp\10341640101\7IIl2eE.exe

                    Filesize

                    1.2MB

                    MD5

                    7d842fd43659b1a8507b2555770fb23e

                    SHA1

                    3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                    SHA256

                    66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                    SHA512

                    d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                  • C:\Users\Admin\AppData\Local\Temp\10341650101\TbV75ZR.exe

                    Filesize

                    1.4MB

                    MD5

                    49e9b96d58afbed06ae2a23e396fa28f

                    SHA1

                    3a4be88fa657217e2e3ef7398a3523acefc46b45

                    SHA256

                    4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

                    SHA512

                    cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

                  • C:\Users\Admin\AppData\Local\Temp\10341660101\f73ae_003.exe

                    Filesize

                    1.3MB

                    MD5

                    eb880b186be6092a0dc71d001c2a6c73

                    SHA1

                    c1c2e742becf358ace89e2472e70ccb96bf287a0

                    SHA256

                    e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                    SHA512

                    b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                  • C:\Users\Admin\AppData\Local\Temp\10341680101\8aa5116110.exe

                    Filesize

                    1.1MB

                    MD5

                    96fa728730da64d7d6049c305c40232c

                    SHA1

                    3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                    SHA256

                    28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                    SHA512

                    c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                    Filesize

                    1KB

                    MD5

                    dcb04e7a3a8ac708b3e93456a8e999bb

                    SHA1

                    7e94683d8035594660d0e49467d96a5848074970

                    SHA256

                    3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                    SHA512

                    c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                  • C:\Users\Admin\AppData\Local\Temp\Asbestos

                    Filesize

                    88KB

                    MD5

                    042f1974ea278a58eca3904571be1f03

                    SHA1

                    44e88a5afd2941fdfbda5478a85d09df63c14307

                    SHA256

                    77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                    SHA512

                    de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                  • C:\Users\Admin\AppData\Local\Temp\Awful

                    Filesize

                    94KB

                    MD5

                    15aa385ce02ed70ad0e6d410634dcc36

                    SHA1

                    5f4dd5f8d56d30f385ef31b746112fa65192f689

                    SHA256

                    0a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81

                    SHA512

                    d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa

                  • C:\Users\Admin\AppData\Local\Temp\Badly

                    Filesize

                    73KB

                    MD5

                    24acab4cd2833bfc225fc1ea55106197

                    SHA1

                    9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                    SHA256

                    b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                    SHA512

                    290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                  • C:\Users\Admin\AppData\Local\Temp\Compilation

                    Filesize

                    1KB

                    MD5

                    f90d53bb0b39eb1eb1652cb6fa33ef9b

                    SHA1

                    7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                    SHA256

                    82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                    SHA512

                    a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                  • C:\Users\Admin\AppData\Local\Temp\Conflict

                    Filesize

                    110KB

                    MD5

                    f0f47ba599c4137c2d0aff75b12ef965

                    SHA1

                    da3f01bbf0f0c84483ac62f33c42ae7bfac7565e

                    SHA256

                    f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b

                    SHA512

                    8c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223

                  • C:\Users\Admin\AppData\Local\Temp\Districts

                    Filesize

                    118KB

                    MD5

                    a26df6e4f2c3a7fa591a0d5b86638a9b

                    SHA1

                    91527cff100165d881f01f1c96bcc64c67589210

                    SHA256

                    9d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999

                    SHA512

                    788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859

                  • C:\Users\Admin\AppData\Local\Temp\Eddie

                    Filesize

                    101KB

                    MD5

                    eb890f27ecb2973730311a494f0eb037

                    SHA1

                    43e5be058b62c5060c0c380f398c99e0428b4b70

                    SHA256

                    1843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83

                    SHA512

                    54934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095

                  • C:\Users\Admin\AppData\Local\Temp\Edit.vss.bat

                    Filesize

                    27KB

                    MD5

                    296bcadefa7c73e37f7a9ad7cd1d8b11

                    SHA1

                    2fdd76294bb13246af53848310fb93fdd6b5cc14

                    SHA256

                    0c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc

                    SHA512

                    33c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356

                  • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                    Filesize

                    25KB

                    MD5

                    ccc575a89c40d35363d3fde0dc6d2a70

                    SHA1

                    7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                    SHA256

                    c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                    SHA512

                    466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                  • C:\Users\Admin\AppData\Local\Temp\Freeware

                    Filesize

                    23KB

                    MD5

                    1e9c4c001440b157235d557ae1ee7151

                    SHA1

                    7432fb05f64c5c34bf9b6728ef66541375f58bbc

                    SHA256

                    dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644

                    SHA512

                    8cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76

                  • C:\Users\Admin\AppData\Local\Temp\Garage

                    Filesize

                    64KB

                    MD5

                    415f7796bcb4a120415fab38ce4b9fd7

                    SHA1

                    c6909e9b6e3ae0129c419befc9194713928fdd65

                    SHA256

                    57ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74

                    SHA512

                    aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb

                  • C:\Users\Admin\AppData\Local\Temp\Jpeg

                    Filesize

                    52KB

                    MD5

                    e80b470e838392d471fb8a97deeaa89a

                    SHA1

                    ab6260cfad8ff1292c10f43304b3fbebc14737af

                    SHA256

                    dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                    SHA512

                    a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                  • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                    Filesize

                    479KB

                    MD5

                    ce2a1001066e774b55f5328a20916ed4

                    SHA1

                    5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                    SHA256

                    572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                    SHA512

                    31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                  • C:\Users\Admin\AppData\Local\Temp\Mitsubishi

                    Filesize

                    60KB

                    MD5

                    b11f1d642d0c88ddc4dc01b0e87858fa

                    SHA1

                    c594a1f4578266a093dacfea74791b2efa0b0ec1

                    SHA256

                    9d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392

                    SHA512

                    f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89

                  • C:\Users\Admin\AppData\Local\Temp\New

                    Filesize

                    92KB

                    MD5

                    340113b696cb62a247d17a0adae276cb

                    SHA1

                    a16ab10efb82474853ee5c57ece6e04117e23630

                    SHA256

                    11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                    SHA512

                    a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                  • C:\Users\Admin\AppData\Local\Temp\Playing

                    Filesize

                    136KB

                    MD5

                    7416577f85209b128c5ea2114ce3cd38

                    SHA1

                    f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                    SHA256

                    a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                    SHA512

                    3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                  • C:\Users\Admin\AppData\Local\Temp\Realized

                    Filesize

                    72KB

                    MD5

                    aadb6189caaeed28a9b4b8c5f68beb04

                    SHA1

                    a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                    SHA256

                    769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                    SHA512

                    852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                  • C:\Users\Admin\AppData\Local\Temp\Remarks

                    Filesize

                    108KB

                    MD5

                    1db262db8e8c732b57d2eba95cbbd124

                    SHA1

                    c24b119bbb5a801e8391c83fb03c52bc3cc28fce

                    SHA256

                    d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587

                    SHA512

                    9d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5

                  • C:\Users\Admin\AppData\Local\Temp\Removed

                    Filesize

                    2KB

                    MD5

                    3ef067e73e874cbb586eb49836e8b9e7

                    SHA1

                    64e28e032bd26ad89e11bfeba046553e072b564b

                    SHA256

                    74a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18

                    SHA512

                    40e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5

                  • C:\Users\Admin\AppData\Local\Temp\Safer

                    Filesize

                    63KB

                    MD5

                    15057186632c228ebcc94fded161c068

                    SHA1

                    3e0c1e57f213336bcf3b06a449d40c5e1708b5c7

                    SHA256

                    da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6

                    SHA512

                    105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc

                  • C:\Users\Admin\AppData\Local\Temp\Sexually

                    Filesize

                    120KB

                    MD5

                    a780012b90011d7a66125a1a37af90a9

                    SHA1

                    459db2d517b0d55c45fa189543de335be7c116f5

                    SHA256

                    bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537

                    SHA512

                    ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c

                  • C:\Users\Admin\AppData\Local\Temp\Uw

                    Filesize

                    59KB

                    MD5

                    0c42a57b75bb3f74cee8999386423dc7

                    SHA1

                    0a3c533383376c83096112fcb1e79a5e00ada75a

                    SHA256

                    137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                    SHA512

                    d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                  • C:\Users\Admin\AppData\Local\Temp\Vermont

                    Filesize

                    61KB

                    MD5

                    e76438521509c08be4dd82c1afecdcd0

                    SHA1

                    6eb1aa79eafc9dbb54cb75f19b22125218750ae0

                    SHA256

                    c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7

                    SHA512

                    db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75

                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                    Filesize

                    1.8MB

                    MD5

                    df504a29ad522d6eabe6258886d296bc

                    SHA1

                    70d007b95628877924e5a41cceabcba93bc46a80

                    SHA256

                    c0472272fbb70a86f21f0b3f156a74e29c9cb3b9c56fefc5594e90879144d4b9

                    SHA512

                    3c356a28dbc7bd1e3c3219cb6f1c55f8ed68702d8e814d9e4de47a0fdb1ebbbaeacc1d7375b157fba7cfaf2487e2a2adde26db121c6f1c5ea1d1c8ce5085ac79

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    6.5MB

                    MD5

                    438c3af1332297479ee9ed271bb7bf39

                    SHA1

                    b3571e5e31d02b02e7d68806a254a4d290339af3

                    SHA256

                    b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                    SHA512

                    984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    b001dfb0719b76803c13e1d389dce109

                    SHA1

                    c992919018344855c0245d639448b2602ef86aff

                    SHA256

                    ce8ed8b4d51a9a812caccc050e41e4bc045e406cb69b34f6888dfce677e50cb6

                    SHA512

                    e59264324926b0dc87356616e52afcac63f67d3341dc3ec3f517aa156d3d1a18f6653a568f6e3f80b8731d3a853a54129985d8bc9075be18c86b9f13df1b5f08

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\32e7bcf8-f090-4b85-8930-a05d5d0e2e8b

                    Filesize

                    11KB

                    MD5

                    1f60a8e6ff674cc1852fb03425db9796

                    SHA1

                    ef78ed5e5f27ebebbec1b1107727c700d676c676

                    SHA256

                    f5f50ed9b0c33a638fbe72d882d22062978d628889a968c6b45f6021ab2de888

                    SHA512

                    b61087c83d53a2913e98b71f5f6cd7a1a8a7b21eb9140cb71dd372fc0a358fa957eb1ac789ff05791612341eddaf7f43903f38741fd2e8087df85ad5dbbad786

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\5b5bab92-bea5-48ae-8dba-d674b8dc4d89

                    Filesize

                    745B

                    MD5

                    df9bb3f73a9c19436c9e69e643eef1de

                    SHA1

                    79a82a349af7b4b07dd44da616666aa98da8f480

                    SHA256

                    bb355b776b3f33a35db7497332373e0fb1969f0a45c8b9ec6c0658313b75fa32

                    SHA512

                    94134369d0fea80c875b2540e0812c17513d66f92b8af839399ef75254ee309629be4ee924e915d6c100ca371ade1b94dbfc4dbf27d8844e595f6c2547c5334f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                    Filesize

                    372B

                    MD5

                    6981f969f95b2a983547050ab1cb2a20

                    SHA1

                    e81c6606465b5aefcbef6637e205e9af51312ef5

                    SHA256

                    13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                    SHA512

                    9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                    Filesize

                    10.2MB

                    MD5

                    54dc5ae0659fabc263d83487ae1c03e4

                    SHA1

                    c572526830da6a5a6478f54bc6edb178a4d641f4

                    SHA256

                    43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                    SHA512

                    8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    dea1586a0ebca332d265dc5eda3c1c19

                    SHA1

                    29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                    SHA256

                    98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                    SHA512

                    0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    a2760a0e4ba15ad929a1c789d14c7de5

                    SHA1

                    84c69cd12f53b30c7787b4634e0168b69df33afc

                    SHA256

                    65aea29724ed9ba5f612c7451c6c99cb06c5f5a8d5e62ee97bb280c65c082f5e

                    SHA512

                    ec2c2b0de17ca9527c8666c58fc74b5096ba3ab603de3b40b47fe1cfb76eb5a3ddbf61a9b6f32ba04d460ecea567c8558bdb6992f03a67b911e2941e0255d3c9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    bf969985d22e71557aa7853b1ba4bc49

                    SHA1

                    3e3fdb1888a2a3e6c19e0d069687fcbb1743b805

                    SHA256

                    29621bd3595286311f7f88d00f55f65a04c99c998a9531192cf5a6bde75a47b5

                    SHA512

                    bd50ac5559335602345b1854218434c0a96236b0039411cafcdd1c8ee4a9ad1724e5d9b606566f5532447293063e58a59eb560f7c7a0642682509ab7f9cd3b74

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    5166c7c7a7388eecbc9e6a59a5db1842

                    SHA1

                    067712f566fc71f4467e8ded2ca472296c3c8490

                    SHA256

                    79286ba3062350482e61e0958f37d861d4f5ce6b4a111c06962531dc097cada0

                    SHA512

                    4ee0d0977c72e92b45717f34807b351d5f4b045a4527e68df1ce63dcb9e0f74bc0a06ae5bfd8412c04e4c79349461eb4a35df424b6093d4bcd79718a4b327e54

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    b1fad8e2054d6f3575eaaf031d811260

                    SHA1

                    64fd7f0ad495a70e8ed0a8ecde46d53b5be44bc8

                    SHA256

                    397a74d9f6289bc9984033f7de260ea1684db7b655f80fb2176b5639d03ceb98

                    SHA512

                    e11dcbbb66d6b7e3dd9c85fdfceb1d6d38deeb21f748ba2d8144512ccaedcfbeea7345a589233db14d79ac08bbd056cae4000115dbfa30c31e745ca72028b1ac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    a296de18eaebd1f6246c9935935337d6

                    SHA1

                    18e1a900aedd1b5ba905618ab1a4659b2a4b661c

                    SHA256

                    65666e305f5560f8c67b0dbf57ccbb36501e189e5cebfbeb8661a2d5e634c26a

                    SHA512

                    80d326cad99f61439c576b3bd61981cc405c976f5192363f3ca5bbbff55bcd51a7bdd55f45c3a5376238cf11d779fec98e7223b6e8e261450d8c4ab41f52fe92

                  • \Users\Admin\AppData\Local\Temp\svchost015.exe

                    Filesize

                    2.9MB

                    MD5

                    b826dd92d78ea2526e465a34324ebeea

                    SHA1

                    bf8a0093acfd2eb93c102e1a5745fb080575372e

                    SHA256

                    7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                    SHA512

                    1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                  • memory/324-304-0x0000000000C60000-0x00000000010C4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/324-301-0x0000000000C60000-0x00000000010C4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/324-256-0x0000000000C60000-0x00000000010C4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/324-263-0x0000000000C60000-0x00000000010C4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/324-262-0x0000000000C60000-0x00000000010C4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/1032-468-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-1363-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-410-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-412-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-414-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-416-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-418-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-420-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1032-423-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1932-48-0x00000000009B0000-0x0000000000CC9000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1932-44-0x00000000009B0000-0x0000000000CC9000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2388-66-0x0000000000AC0000-0x0000000001137000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2388-67-0x0000000000AC0000-0x0000000001137000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2580-293-0x00000000068F0000-0x0000000006D8F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2580-308-0x00000000068F0000-0x0000000006D8F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2580-45-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-47-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-403-0x00000000068F0000-0x0000000007301000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/2580-404-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-42-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-64-0x00000000068F0000-0x0000000006F67000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2580-63-0x00000000068F0000-0x0000000006F67000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2580-68-0x0000000006290000-0x00000000065A9000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2580-69-0x0000000006290000-0x00000000065A9000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2580-39-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-83-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-100-0x00000000068F0000-0x0000000006F67000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2580-424-0x00000000068F0000-0x0000000007301000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/2580-40-0x0000000006290000-0x00000000065A9000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2580-24-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-451-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-16-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-356-0x00000000068F0000-0x0000000007301000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/2580-200-0x00000000068F0000-0x0000000006F67000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2580-23-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-254-0x0000000006170000-0x00000000065D4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2580-354-0x00000000068F0000-0x0000000007301000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/2580-19-0x00000000011A1000-0x00000000011CF000-memory.dmp

                    Filesize

                    184KB

                  • memory/2580-338-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-253-0x0000000006170000-0x00000000065D4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2580-273-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-335-0x00000000068F0000-0x0000000006D8F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2580-274-0x0000000006170000-0x00000000065D4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2580-20-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-22-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-314-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-41-0x0000000006290000-0x00000000065A9000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2580-292-0x0000000006170000-0x00000000065D4000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2580-1098-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-1777-0x00000000011A0000-0x0000000001665000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2580-290-0x00000000068F0000-0x0000000006D8F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2764-5-0x0000000000FC0000-0x0000000001485000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2764-15-0x0000000000FC0000-0x0000000001485000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2764-1-0x0000000076F30000-0x0000000076F32000-memory.dmp

                    Filesize

                    8KB

                  • memory/2764-2-0x0000000000FC1000-0x0000000000FEF000-memory.dmp

                    Filesize

                    184KB

                  • memory/2764-18-0x0000000007230000-0x00000000076F5000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2764-10-0x0000000000FC0000-0x0000000001485000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2764-0-0x0000000000FC0000-0x0000000001485000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2764-3-0x0000000000FC0000-0x0000000001485000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/3156-422-0x0000000000400000-0x0000000000CE9000-memory.dmp

                    Filesize

                    8.9MB

                  • memory/3232-291-0x0000000001140000-0x00000000015DF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3232-315-0x0000000001140000-0x00000000015DF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3232-334-0x0000000001140000-0x00000000015DF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3232-336-0x0000000001140000-0x00000000015DF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3772-355-0x0000000000400000-0x0000000000E11000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/3772-377-0x0000000000400000-0x0000000000E11000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/3788-1762-0x00000000036B0000-0x0000000003714000-memory.dmp

                    Filesize

                    400KB

                  • memory/3788-1756-0x00000000036B0000-0x0000000003714000-memory.dmp

                    Filesize

                    400KB

                  • memory/3788-1758-0x00000000036B0000-0x0000000003714000-memory.dmp

                    Filesize

                    400KB

                  • memory/3788-1757-0x00000000036B0000-0x0000000003714000-memory.dmp

                    Filesize

                    400KB

                  • memory/3788-1761-0x00000000036B0000-0x0000000003714000-memory.dmp

                    Filesize

                    400KB

                  • memory/3972-373-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-361-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-376-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-425-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-371-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-369-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-367-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-365-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-446-0x0000000010000000-0x000000001001C000-memory.dmp

                    Filesize

                    112KB

                  • memory/3972-469-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3972-363-0x0000000000400000-0x000000000042E000-memory.dmp

                    Filesize

                    184KB

                  • memory/3984-1764-0x0000000000400000-0x000000000069A000-memory.dmp

                    Filesize

                    2.6MB